id
stringlengths 3
8
| url
stringlengths 32
207
| title
stringlengths 1
114
| text
stringlengths 93
492k
|
---|---|---|---|
45400268
|
https://en.wikipedia.org/wiki/.NET
|
.NET
|
.NET (pronounced as "dot net"; previously named .NET Core) is a free and open-source, managed computer software framework for Windows, Linux, and macOS operating systems. It is a cross-platform successor to .NET Framework. The project is primarily developed by Microsoft employees by way of the .NET Foundation, and released under the MIT License.
History
On November 12, 2014, Microsoft announced .NET Core, in an effort to include cross-platform support for .NET, including Linux and macOS, source for the .NET Core CoreCLR implementation, source for the "entire [...] library stack" for .NET Core, and the adoption of a conventional ("bazaar"-like) open-source development model under the stewardship of the .NET Foundation. Miguel de Icaza describes .NET Core as a "redesigned version of .NET that is based on the simplified version of the class libraries", and Microsoft's Immo Landwerth explained that .NET Core would be "the foundation of all future .NET platforms". At the time of the announcement, the initial release of the .NET Core project had been seeded with a subset of the libraries' source code and coincided with the relicensing of Microsoft's existing .NET reference source away from the restrictions of the Ms-RSL. Landwerth acknowledged the disadvantages of the formerly selected shared license, explaining that it made codename Rotor "a non-starter" as a community-developed open source project because it did not meet the criteria of an Open Source Initiative (OSI) approved license.
1.0 was released on June 27, 2016, along with Microsoft Visual Studio 2015 Update 3, which enables .NET Core development. 1.0.4 and .NET Core 1.1.1 were released along with .NET Core Tools 1.0 and Visual Studio 2017 on March 7, 2017.
.NET Core 2.0 was released on August 14, 2017, along with Visual Studio 2017 15.3, ASP.NET Core 2.0, and Entity Framework Core 2.0. 2.1 was released on May 30, 2018. NET Core 2.2 was released on December 4, 2018.
.NET Core 3 was released on September 23, 2019. .NET Core 3 adds support for Windows desktop application development and significant performance improvements throughout the base library.
In November 2020, Microsoft released .NET 5.0, which replaced .NET Framework. The "Core" branding was removed and version 4.0 was skipped to avoid conflation with .NET Framework. It addresses the patent concerns related to the .NET Framework.
In November 2021, Microsoft released .NET 6.0.
.NET Core 2.1 and later, i.e. including .NET 5, support Alpine Linux (Alpine primarily supports and uses musl libc).
As of .NET 5, Windows Arm64 is natively supported. Previously, .NET on ARM was applications compiled for the x86 architecture, thereby meaning the applications were using the ARM emulation layer.
Language support
.NET fully supports C# and F# (and C++/CLI as of 3.1; only enabled on Windows) and supports Visual Basic .NET (for version 15.5 in .NET Core 5.0.100-preview.4, and some old versions supported in old .NET Core).
VB.NET compiles and runs on .NET, but as of .NET Core 3.1, the separate Visual Basic Runtime is not implemented. Microsoft initially announced that .NET Core 3 would include the Visual Basic Runtime, but after two years the timeline for such support was updated to .NET 5.
Architecture
.NET supports four cross-platform scenarios: ASP.NET Core web apps; command-line/console apps; libraries; and Universal Windows Platform apps. Prior to .NET Core 3.0, it did not implement Windows Forms or Windows Presentation Foundation (WPF), which render the standard GUI for desktop software on Windows. Now, however, .NET Core 3 supports desktop technologies Windows Forms, WPF, and Universal Windows Platform (UWP). It is also possible to write cross-platform graphical applications using .NET with the GTK# language-binding for the GTK widget toolkit.
.NET supports use of NuGet packages. Unlike .NET Framework, which is serviced using Windows Update, .NET relies on its package manager to receive updates. Starting in December 2020, however, .NET updates started being delivered via Windows Update as well.
The two main components of .NET are CoreCLR and CoreFX, which are comparable to the Common Language Runtime (CLR) and the Framework Class Library (FCL) of the .NET Framework's Common Language Infrastructure (CLI) implementation.
As a CLI implementation of Virtual Execution System (VES), CoreCLR is a complete runtime and virtual machine for managed execution of CLI programs and includes a just-in-time compiler called RyuJIT. also contains CoreRT, the runtime optimized to be integrated into AOT compiled native binaries.
As a CLI implementation of the foundational Standard Libraries, CoreFX shares a subset of APIs, however, it also comes with its own APIs that are not part of the . A variant of the .NET library is used for UWP.
The .NET command-line interface offers an execution entry point for operating systems and provides developer services like compilation and package management.
Mascot
The official community mascot of .NET is the .NET Bot (stylized as "dotnet bot" or "dotnet-bot"). The dotnet bot served as the placeholder developer for the initial check-in of the .NET source code when it was open-sourced. It has since been used as the official mascot.
Notes
References
Further reading
External links
Overview of .NET Framework (MSDN)
.NET GitHub repository
.NET implementations
Cross-platform software
Microsoft application programming interfaces
Microsoft development tools
Microsoft free software
Software using the MIT license
2016 software
|
15803151
|
https://en.wikipedia.org/wiki/3Roam
|
3Roam
|
3Roam provides high-capacity microwave transmission equipments for wireless and packet networks convergence. 3Roam solutions aim at bridging the gap between traditional microwave transmission technologies and advanced networking techniques.
By nature, microwave links characteristics are variable. Weather conditions can reduce the performances of a link, decreasing significantly its capacity. 3Roam equipments overcome these limitations by incorporating a packet router, that re-routes packets intelligently in the network, in case such perturbation occurs.
3Roam solutions integrate seamlessly in corporate networks or network operators backhaul systems through their native packet architectures and allow for the smart inclusion of microwave links into an overall packet transport system.
Corporate history
3Roam was founded in 2005. The founding team identified very early that microwave transmission equipments were still using outdated transport protocols inherited from the early telecom days, while the introduction of label switching and MPLS protocols were revolutionizing IP transport networks.
To get microwave technologies ready to take up the challenge of being an active part in complex IP transport networks, the company developed its MicrowaveRouter product.
3Roam's MicrowaveRouter is the first microwave equipment to incorporate a complete native IP layer 3 processing core, while competing products only support on plain Ethernet switching.
Notes
External links
3Roam Home Page
Article about 3ROAM financing round
Telecommunications companies of France
|
31454110
|
https://en.wikipedia.org/wiki/Sarah%20Palin%20email%20hack
|
Sarah Palin email hack
|
The Sarah Palin email hack occurred on September 16, 2008, during the 2008 United States presidential election campaign when vice presidential candidate, Sarah Palin's, Yahoo! personal email account was subjected to unauthorized access. The hacker, David Kernell, obtained access to Palin's account by looking up biographical details, such as her high school and birthdate, and using Yahoo!'s account recovery for forgotten passwords. Kernell then posted several pages of Palin's email on 4chan's /b/ board. Kernell, who at the time of the offense was a 20-year-old college student, was the son of longtime Democratic state representative Mike Kernell of Memphis.
Kernell was charged in October 2008 in federal court. After he was led into the court in leg irons and handcuffs, the judge released him on his own recognizance, pending trial. The incident was ultimately prosecuted in a U.S. federal court as four felony crimes punishable by up to 50 years in federal prison. The charges were three felonies: identity theft, wire fraud, and anticipatory obstruction of justice; and one optional as felony or misdemeanor: intentionally accessing an account without authorization. Kernell pleaded not guilty to all counts.
A jury trial, featured testimony of Sarah and Bristol Palin, as well as 4chan founder Christopher Poole, began on April 20, 2010. The jury found Kernell guilty on two counts: the felony of anticipatory obstruction of justice and the misdemeanor of unauthorized access to a computer. On her Facebook page, Sarah Palin stated that she and her family were thankful the jury had rendered a just verdict.
Kernell was sentenced on November 12, 2010, to one year plus a day in federal custody, followed by three years of supervised release. The sentencing judge recommended that the custody be served in a halfway house, but the Federal Bureau of Prisons sent him instead to a minimum security prison. He was released on November 23, 2011. In January 2012, the United States Court of Appeals for the Sixth Circuit found Kernell's awareness of a possible future FBI investigation was enough to uphold a conviction on obstruction of justice.
Incident
Shortly after midnight on September 16, 2008, the private Yahoo! Mail account of Sarah Palin was cracked by a 4chan user. The hacker, known as "Rubico", claimed he had read Palin's personal e-mails because he was looking for something that "would derail her campaign."
After reading through Palin's emails, Rubico wrote, "There was nothing there, nothing incriminating — all I saw was personal stuff, some clerical stuff from when she was governor." Rubico wrote that he used the Sarah Palin Wikipedia article to find Palin's birth date (one of the standard security questions used by Yahoo!.) in "15 seconds." The hacker posted the account's password on /b/, an image board on 4chan, and screenshots from within the account to WikiLeaks.
A /b/ user then logged in and changed the password, posting a screenshot of his sending an email to a friend of Palin's informing her of the new password on the /b/ thread. This man was criticized heavily by the /b/ community, for being a "white knight". However, he did not blank out the password in the screenshot. A multitude of /b/ users then attempted to log in with the new password, and the account was automatically locked out by Yahoo!. The incident was criticized by some /b/ users, one of whom complained that "seriously, /b/. We could have changed history and failed, epically." The hacker admitted he was worried about being caught, writing "Yes I was behind a proxy, only one, if this sh*t ever got to the FBI I was f**ked, I panicked, I still wanted the stuff out there ... so I posted the [information] ... and then promptly deleted everything, and unplugged my internet and just sat there in a comatose state."
The hacker left behind traces of his activity. His IP address was logged at the proxy he used, CTunnel.com, and he also left his email address [email protected] when he posted at 4chan. Furthermore, the attacker revealed the original web address used by the proxy by leaving this information in the screenshot which according to experts can also help the investigation. 4chan's /b/ board is not archived, and posts are only retained for a short time. However, with the great interest surrounding the posts of Rubico, many, including the magazine Wired, archived the original posts. The email address left behind was then connected to David Kernell through various social networking profiles where it was used, though no official investigation took place at this time.
Campaign response
John McCain's campaign condemned the incident, saying it was a "shocking invasion of the governor's privacy and a violation of law". Barack Obama's spokesman Bill Burton called the hacking "outrageous".
Federal investigation
The FBI and Secret Service began investigating the incident and on September 20, it was revealed that they were questioning David Kernell, a 20-year-old economics student at the University of Tennessee and the son of Democratic Tennessee State Representative Mike Kernell from Memphis. The handle used by the hacker when making his post at 4chan pointed to him, although this evidence was inconclusive because of the frequent pranks pulled at that board. The hacker's proxy service provided its logs, which pointed to Kernell's residence.
FBI agents served a federal search warrant at David Kernell's apartment in Knoxville. Agents spent two hours taking pictures of everything inside his apartment. Kernell's three roommates were also subpoenaed and expected to testify the following week in Chattanooga. The obstruction of justice charge stems from an allegation by the FBI that Kernell attempted to erase evidence of the crime from his hard drive. Kernell's father told Wired that he was aware that his son was a suspect, but he did not ask him anything about it over concerns that he may have to testify in court.
Indictment
A second federal grand jury in Knoxville returned an indictment of Kernell on October 7, 2008. He was charged with violating and , or unlawful access to stored communications and intentionally accessing a computer without authorization across state lines, respectively. Kernell turned himself in the next day. Kernell pleaded not guilty. The court released Kernell on his own recognizance. Kernell's attorney claimed that using "an e-mail address and a birth date does not constitute identity theft"; however, the court rejected that argument saying "once Governor Palin chose the Yahoo! ID [email protected], that became her unique address, and no one else could choose it."
Trial
In October 2008, Kernell was brought into court in handcuffs and ankle shackles to plead not guilty to the hacking and was released on bond. The case went to trial eighteen months later, on April 20, 2010. On April 23, Sarah Palin testified for 44 minutes. Her daughter, Bristol, testified as well. Following the conclusion of testimony, Sarah said, "I think there need to be consequences for bad behavior."
Verdict and sentence
On April 30, 2010, David Kernell was found guilty on two of four counts: the felony of anticipatory obstruction of justice by destruction of records and found for the lower misdemeanor option of unauthorized access to a computer. The jury acquitted him of the charge of wire fraud. It was deadlocked on identity theft charge, so the judge declared a mistrial on that charge. In response, Palin issued a press release comparing the case to Watergate.
Sarah Palin said the family was "thankful that the jury thoroughly and carefully weighed the evidence and issued a just verdict."
The prosecutor, Assistant U.S. Attorney Greg Weddle, who had sought an 18-month prison sentence for Kernell, promised a retrial on the identity theft charge should he be successful in his attempt at receiving a new trial.
In November 2010 Kernell was sentenced to a year and a day of prison, preferably to be served in a halfway house, plus three years of probation, by U.S. District Judge Thomas Phillips, though he noted the Federal Bureau of Prisons (BOP) could override his recommendations. However, the BOP, which makes the ultimate determination as to where federal prisoners serve their sentence, assigned Kernell to the minimum security prison at the Federal Correctional Institution, Ashland near Ashland, Kentucky. Jose Santana, the chief of the BOP's Designation and Sentence Computation Center, said that halfway houses are for convicts who have limited skills and/or limited support from their families. Because Kernell had the support of his family and had attended a university for three years, Santana argued that he does not need to be in a halfway house. Kernell was later relocated to a halfway house.
Perpetrator
David Kernell was the son of longtime Democratic state representative Mike Kernell of Memphis.
Kernell won the Tennessee Open Scholastic Chess Championship in 2004, and graduated in 2006 from Germantown High School. After release from BOP custody, he returned to the University of Tennessee, Knoxville to finish an economics degree. He first volunteered his programming skills to Tennessee Voices for Children, a child advocacy nonprofit group. Diagnosed with multiple sclerosis (MS) in 2014, Kernell participated in clinical research trials at the Cedars-Sinai Neurosciences Research Center in Los Angeles to help develop cures and treatments for other victims of MS. After moving to California, he developed facial recognition software that could identify children at risk of abuse.
Kernell died on February 2, 2018 in Newport Beach, California at the age of 30, from complications related to progressive MS.
See also
Email privacy
Secrecy of correspondence
References
External links
Court testimony by 4chan's founder and former administrator "moot"
Email hack
2008 crimes in the United States
Privacy of telecommunications
Yahoo! Mail
Privacy in the United States
Hacking of Yahoo!
Email hacking
4chan
September 2008 crimes
Hacking in the 2000s
|
22793769
|
https://en.wikipedia.org/wiki/Ecosystem%20management
|
Ecosystem management
|
Ecosystem management is an approach to natural resource management that aims to ensure the long-term sustainability and persistence of an ecosystems function and services while meeting socioeconomic, political, and cultural needs. Although indigenous communities have employed sustainable ecosystem management approaches for millennia, ecosystem management emerged formally as a concept in the 1990s from a growing appreciation of the complexity of ecosystems, as well as humans' reliance and influence on natural systems (e.g., disturbance, ecological resilience).
Building upon traditional natural resource management, ecosystem management integrates ecological, socioeconomic, and institutional knowledge and priorities through diverse stakeholder participation. In contrast to command and control approaches to natural resource management, which often lead to declines in ecological resilience, ecosystem management is a holistic, adaptive method for evaluating and achieving resilience and sustainability. As such, implementation is context-dependent and may take a number of forms, including adaptive management, strategic management, and landscape-scale conservation.
Formulations
The term “ecosystem management” was formalized in 1992 by F. Dale Robertson, the then Chief of the U.S. Forest Service. Robertson stated, “By ecosystem management, we mean an ecological approach… [that] must blend the needs of people and environmental values in such a way that the National Forests and Grasslands represent diverse, healthy, productive and sustainable ecosystems.” A variety of additional definitions of ecosystem management exist, although definitions of this concept are typically vague. For example, Robert T. Lackey emphasizes that ecosystem management is informed by ecological and social factors, motivated by societal benefits, and implemented over a specific timeframe and area. F. Stuart Chapin and co-authors highlight that ecosystem management is guided by ecological science to ensure the long-term sustainability of ecosystem services, while Norman Christensen and coauthors underscore that it is motivated by defined goals, employs adaptive practices, and accounts for the complexities of ecological systems. Peter Brussard and colleagues suggest ecosystem management balances preserving ecosystem health while sustaining human needs.
As a concept of natural resource management, ecosystem management remains both ambiguous and controversial, in part because some of its formulations rest on contested policy and scientific assertions. These assertions are important to understanding much of the conflict surrounding ecosystem management. Professional natural resource managers, typically operating from within government bureaucracies and professional organizations, often mask debate over controversial assertions by depicting ecosystem management as an evolution of past management approaches.
Principles of ecosystem management
A fundamental principle of ecosystem management is the long-term sustainability of the production of goods and services by ecosystems, as "intergenerational sustainability [is] a precondition for management, not an afterthought". Ideally, there should be clear, publicly-stated goals with respect to future trajectories and behaviors of the system being managed. Other important requirements include a sound ecological understanding of the system, including connectedness, ecological dynamics, and the context in which the system is embedded. An understanding of the role of humans as components of the ecosystems and the use of adaptive management is also important. While ecosystem management can be used as part of a plan for wilderness conservation, it can also be used in intensively managed ecosystems (e.g., agroecosystem and close to nature forestry).
Core principles and common themes of ecosystem management:
Systems thinking: Management has a holistic perspective, instead of focusing on a particular level of biological hierarchy in an ecosystem (e.g., only conserving a specific species; only preserving ecosystem functioning).
Ecological boundaries: Ecological boundaries are clearly and formally defined, and management is place-based and may require working across political or administrative boundaries.
Ecological integrity: Management is focused on maintaining or reintroducing native biological diversity, and on preserving natural disturbance regimes and other key processes that sustain resilience.
Data collection: Broad ecological research and data collection is needed to inform effective management (e.g., species diversity, habitat types, disturbance regimes, etc.).
Monitoring: The impacts of management methods are tracked, allowing for their outcomes to be evaluated and modified, if needed.
Adaptive management: Management is an iterative process in which methods are continuously reevaluated as new scientific knowledge is gained.
Interagency cooperation: As ecological boundaries often cross administrative boundaries, management requires cooperation among a range of agencies and private stakeholders.
Organizational change: Successful implementation of management requires shifts in the structure and operation of land management agencies.
Humans and nature: Nature and people are intrinsically linked, and humans shape, and are shaped by, ecological processes.
Values: Humans play a key role in guiding management goals, which reflect a stage in the continuing evolution of social values and priorities.
History
Pre-industrialization
Sustainable ecosystem management approaches have been used by societies throughout human history. Prior to colonization, Indigenous cultures often sustainably managed their natural resources through intergenerational traditional ecological knowledge (TEK). In TEK, cultures acquire knowledge of their environment over time and this information is passed on to future generations through cultural customs, including folklore, religion, and taboos. Traditional management strategies vary by region, and examples include the burning of the longleaf pine ecosystem by Native Americans in what is today the southeastern United States; the ban of seabird guano harvest during the breeding season by the Inca; the sustainable harvest practices of glaucous-winged gull eggs by the Huna Tlingit; and the Maya milpa intercropping approach, which is still used today.
Post-industrialization
In industrialized Western society, ecosystems have been managed primarily to maximize yields of a particular natural resource. This method to managing ecosystems can be seen by the U.S. Forest Service's shift away from sustaining ecosystem health and toward maximizing timber production to support residential development following World War II. Further, underlying traditional natural resource management is the view that each ecosystem has a single equilibrium and minimizing variation around this equilibrium results in more dependable, greater yields of natural resources. For example, this perspective informed the long-held belief in forest fire suppression in the United States, which has driven a decline in populations of fire-tolerant species as well as fuel buildup, leading to higher intensity fires. Additionally, traditional approaches to managing natural systems tended to be site- and species-specific, rather than considering all components of an ecosystem collectively; employ a “command and control” approach; and exclude stakeholders from management decisions.
The latter half of the 20th century saw a paradigm shift in how ecosystems were viewed, with a growing appreciation for the importance of disturbance and for the intrinsic link between natural resources and overall ecosystem health. Simultaneously, there was acknowledgement of society's resilience on ecosystem services, beyond provisioning goods, and of the inextricable role human-environment interactions play in ecosystems. In sum, ecosystems were increasingly seen as complex systems, shaped by non-linear processes, and thus, they could not be managed to achieve a single, predictable outcome. As a result of these complexities and often unforeseeable feedbacks from management strategies, DeFries and Nagendra deem ecosystem management to be a “wicked problem”. Thus, the outcome of traditional natural resource management's "evolution" over the course of the 20th century is ecosystem management, which explicitly recognizes that technical and scientific knowledge, though necessary in all approaches to natural resource management, are insufficient alone.
Stakeholders
Stakeholders are individuals or groups who are affected by or have an interest in ecosystem management decisions and actions. Stakeholders may also have power to influence the goals, policies, and outcomes of management. Ecosystem management stakeholders fall into the following groups based on their diverse concerns:
Stakeholders whose lives are directly tied to the ecosystem (e.g., members of local community)
Stakeholders who are not directly not impacted, but have an interest in the ecosystem or its ecosystem services (e.g., NGOs, recreational groups)
Stakeholders concerned with the decision-making processes (e.g., environmental advocacy groups)
Stakeholders funding management plans (e.g., taxpayers, funding agencies)
Stakeholders representing public interest (e.g., public officials)
Strategies to stakeholder participation
The complexity of ecosystem management decisions, ranging from local to international scales, requires the participation of stakeholders with diverse understandings, perceptions, and values of ecosystems and ecosystem services. Due to these complexities, effective ecosystem management is flexible and develops reciprocal trust around issues of common interest, with the objective of creating mutually beneficial partnerships. Key attributes of successful participatory ecosystem management efforts have been identified:
Stakeholder involvement is inclusive, equitable, and focused on trust-building and empowerment.
Stakeholders are engaged early on, and their involvement continues beyond decision and into management.
Stakeholder analysis is performed to ensure parties are appropriately represented. This involves determining the stakeholders involved in the management issue; categorizing stakeholders based on their interest in and influence on the issue; and evaluating relationships between stakeholders.
Stakeholders agree upon the aims of the participatory process from its beginning, and the means and extent of stakeholder participation are case-specific.
Stakeholder participation is conducted through skilled facilitation.
Social, economic, and ecological goals are equally weighed, and stakeholders are actively involved in decision making, which is arrived at by collective consensus.
Stakeholders continually monitor management plan’s effectiveness.
Multidisciplinary data are collected, reflecting multidisciplinary priorities, and decisions are informed by both local and scientific knowledge.
Economic incentives are provided to parties responsible for implementing management plans.
To ensure long-term stakeholder involvement, participation is institutionalized.
Examples of stakeholder participation
Malpai Borderland management:
In the early 1990s, there was ongoing conflict between the ranching and environmentalist communities in the Malpai Borderlands. The former group was concerned about sustaining their livelihoods, while the latter was concerned about the environmental impacts of livestock grazing. The groups found common ground around conserving and restoring rangeland, and diverse stakeholders, including ranchers, environmental groups, scientists, and government agencies, were engaged in management discussions. In 1994, the rancher-led Malpai Borderlands Group was created to collaboratively pursue the goals of ecosystem protection, management, and restoration.
Helge å River & Kristianstads Vattenrike Biosphere Reserve:
In the 1980s, local government agencies and environmental groups noted declines in the health of the Helge å River ecosystem, including eutrophication, bird population declines, and deterioration of flooded meadows areas. There was concern that the Helge å, a Ramsar Wetland of International Importance, faced an imminent tipping point. In 1989, led by a municipal organization, a collaborative management strategy was adopted, involving diverse stakeholders concerned with the ecological, social, and economic facets of the ecosystem. The Kristianstads Vattenrike Biosphere Reserve was established in 2005 to promote the preservation of the ecosystem's socio-ecological services.
Strategies to ecosystem management
Several strategies to implementing the maintenance and restoration of natural and human-modified ecosystem exist. Command and control management and traditional natural resource management are the precursors to ecosystem management. Adaptive management, strategic management, and landscape-level conservation are different methodologies and processes involved in implementing ecosystem management:
Command and control management
Command and control management utilizes a linear problem solving approach, in which a perceived problem is resolved through controlling devices such as laws, threats, contracts, and/or agreements. This top-down approach is used across many disciplines, and it is best suited for addressing relatively simple, well-defined problems, which have a clear cause and effect, and for which there is broad societal agreement as to policy and management goals. In the context of natural systems, command and control management attempts to control nature in order to improve [[natural resource extractions, establish predictability, and reduce threats. Command and control strategies include the use of herbicides and pesticides to improve crop yields; the culling of predators to protect game bird species; and the safeguarding of timber supply, by suppressing forest fires.
However, due to the complexities of ecological systems, command and control management may result in unintended consequences. For example, wolves were extirpated from Yellowstone National Park in the mid-1920s to reduce elk predation. Long-term studies of wolf, elk, and tree populations since wolf reintroduction in 1995 demonstrate that reintroduction has decreased elk populations, improving tree species recruitment. Thus, by controlling ecosystems to limit natural variation and increase predictability, command and control management often leads to a decline the resilience of ecological, social, and economic systems, termed the “pathology of natural resource management”. In this “pathology”, an initially successful command and control practice drives relevant institutions to shift their focus toward control, over time obscuring the ecosystem’s natural behavior, while the economy becomes reliant on the system in its controlled state. Consequently, there has been a transition away from command and control management, and increased focus on more holistic adaptive management approaches and on arriving at management solutions through partnerships between stakeholders.
Natural resource management
The term natural resource management is frequently used in relation to a particular resource for human use, rather than the management of a whole ecosystem. Natural resource management aims to fulfill the societal demand for a given resource without causing harm to the ecosystem, or jeopardizing the future of the resource. Due to its focus on natural resources, socioeconomic factors significantly affect this management approach. Natural resource managers initially measure the overall condition of an ecosystem, and if the ecosystem's resources are healthy, the ideal degree of resource extraction is determined, which leaves enough to allow the resource to replenish itself for subsequent harvests. The condition of each resource in an ecosystem is subject to change at different spatial and time scales, and ecosystem attributes, such as watershed and soil health, and species diversity and abundance, need to be considered individually and collectively.
Informed by natural resource management, the ecosystem management concept is based on the relationship between sustainable ecosystem maintenance and human demand for natural resources and other ecosystem services. To achieve these goals, ecosystem managers can be appointed to balance natural resource extraction and conservation over a long-term timeframe. Partnerships between ecosystem managers, natural resource managers, and stakeholders should be encouraged in order to promote the sustainable use of limited natural resources.
Historically, some ecosystems have experienced limited resource extraction and have been able to subsist naturally. Other ecosystems, such as forests, which in many regions provide considerable timber resources, have undergone successful reforestation and consequently, have accommodated the needs of future generations. As human populations grow, introducing new stressors to ecosystems, such as climate change, invasive species, land-use change, and habitat fragmentation, future demand for natural resources is unpredictable. Although ecosystem changes may occur gradually, their cumulative impacts can have negative effects for both humans and wildlife. Geographic information system (GIS) applications and remote sensing can be used to monitor and evaluate natural resources and ecosystem health.
Adaptive management
Adaptive management is based on the concept that predicting future influences and disturbances to an ecosystem is limited and unclear. Therefore, an ecosystem should be managed to it maintain the greatest degree of ecological integrity and management practices should have the ability to change based on new experience and insights. In an adaptive management strategy, a hypotheses about an ecosystem and its functioning is formed, and then management techniques to test these hypotheses are implemented. The implemented methods are then analyzed to evaluate if ecosystem health improved or declined, and further analysis allows for the modification of methods until they successfully meet the needs of the ecosystem. Thus, adaptive management is an iterative approach, encouraging “informed trial-and-error”.
This management approach has had mixed success in the field of ecosystem management, fisheries management, wildlife management, and forest management, possibly because ecosystem managers may not be equipped with the decision-making skills needed to undertake an adaptive management methodology. Additionally, economic, social, and political priorities can interfere with adaptive management decisions. For this reason, for adaptive management to be successful it must be a social and scientific process, focusing on institutional strategies while implementing experimental management techniques.
Strategic management
As it relates to ecosystem management, strategic management encourages the establishment of goals that will sustain an ecosystem while keeping socioeconomic and politically relevant policy drivers in mind. This approach differs from other types of ecosystem management because it emphasizes stakeholders involvement, relying on their input to develop the best management strategy for an ecosystem. Similar to other methods of ecosystem management, strategic management prioritizes evaluating and reviewing any impacts of management intervention on an ecosystem, and flexibility in adapting management protocols as a result of new information.
Landscape-level conservation
Landscape-level (or landscape-scale) conservation is a method that considers wildlife needs at a broader landscape scale when implementing conservation initiatives. By considering broad-scale, interconnected ecological systems, landscape-level conservation acknowledges the full scope of an environmental problem. Implementation of landscape-scale conservation is carried out in a number of ways. A wildlife corridor, for example, provides a connection between otherwise isolated habitat patches, presenting a solution to habitat fragmentation. In other instances, the habitat requirements of a keystone or vulnerable species is assessed to identify the best strategies for protecting the ecosystem and the species. However, simultaneously addressing the habitat requirements of multiple species in an ecosystem can be difficult, and as a result, more comprehensive approaches have been considered in landscape-level conservation.
In human-dominated landscapes, weighing the habitat requirements of wild flora and fauna versus the needs of humans presents challenges. Globally, human-induced environmental degradation is an increasing problem, which is why landscape-level approaches play an important role in ecosystem management. Traditional conservation methods targeted at individual species may need to be modified to include the maintenance of habitats through the consideration of both human and ecological factors.
See also
Ecosystem-based management
Ecosystem Management Decision Support
Sustainable forest management
Sustainable land management
References
Ecosystems
Natural resource management
|
30577785
|
https://en.wikipedia.org/wiki/Sree%20Narayana%20Gurukulam%20College%20of%20Engineering
|
Sree Narayana Gurukulam College of Engineering
|
Sree Narayana Gurukulam College of Engineering was established in 2002 by Kunnathunadu S.N.D.P Union. It is named after Sree Narayana Guru (1855–1928).
Campus
The campus occupies 40 acres in the outskirts of Kochi. The college is 4 km north of Kolenchery and 14 km south of Perumbavoor on the Kolenchery - Perumbavoor road. The college is housed in its permanent location and has a constructed area of 165,400 sq ft. It has separate dormitories for men and women. The ladies' hostel is located within the campus.
Management
The college is managed by the Sree Narayana Gurukulam Trust, a registered charitable society comprising personalities from diverse spheres in Kerala. The functioning of the institution is steered by the Sree Narayana Gurukulam Trust. The members of the trust hail from various professional fields. The College has been approved by the All-India Council for Technical Education (AICTE) , New Delhi and it is affiliated to Mahatma Gandhi University and APJ Abdul Kalam Technological University, Kerala.
Departments and facilities
Post Graduate Programmes
Master of Computer Applications (2 Year Regular)
Master of Business Administration (Regular)
The college offers MTech in eight courses:
Computer Science And Engineering (CSE)
Cyber Security
Machine Designing
Power Electronics
Computer Aided Structural Engineering
Structural Engineering And Construction Management
Vlsi And Embedded System
Communication Engineering
Undergraduate Programmes
Naval Architecture and Ship Building Engineering (NASB)
Electronics and Communication Engineering (ECE)
Electrical and Electronics Engineering (EEE)
Computer Science and Engineering (CSE)
Mechanical Engineering (ME)
Civil Engineering (CE)
Master of Computer Applications (MCA Regular - 2 years)
Naval Architecture and Ship Building
Established in the academic year 2013-14, the Department offers BTech program in Naval Architecture & Ship Building Engineering. SNGCE is the only college in the self-financing sector that offers course "BTech in Naval Architecture and Ship Building Engineering". The department offers BTech in Naval Architecture and Ship building is tied up with Department of Ocean Engineering, Indian Institute of Technology, Madras for utilizing some of the lab facilities. The first batch of students will graduate in 2017.
Library
The library in SNGCE has over 15,847 volumes. It has spacious reading room, reference section, journal section, periodical section and CD ROM-based information systems.
Computer laboratories
The college has eleven computer labs:
Programming Lab
Data structures Lab
Database Lab
System software Lab
Computer Hardware and networking Lab
Network Programming Lab
Graphics and Multimedia Lab
Internet Lab
CAD Lab
Linux Lab
Data Centre
Naval Architecture and ship building Engineering
Welding Lab : TIG, MIG, SAW, MAW
Ship Design Lab
Fire Control Lab
CAM Lab
Naval Architecture also has access to the laboratories of mechanical engineering department.
Electronics and Communication Engineering
Basic Electronics Lab
Communications Lab I
Electronics Circuit Lab
Micro Processor Lab
Computer programming Lab
Systems Lab
Communications Lab II
Linear IC Lab
Digital Lab
Electrical Electronics Engineering
Basic Electrical Lab
Computer Programming Lab
Electrical Machines Lab
Electrical Measurements Lab
Hydraulic Machines Lab
Heat Engines Lab
Electronic Circuit Lab
Control Systems Lab
Power Electronics Lab
Electrical Engineering Workshop
Mechanical Engineering
Mechanical Workshop - Smithy Fitting Foundry and Carpentry
Heat Engines Lab
Electrical & Electronics Lab
Computer Lab
Hydraulic Machines Lab
Fluid Mechanics Lab
Mechanical Engineering Lab
CNC Lab
Civil Engineering
Survey Lab
Concrete Lab
Material Testing Lab
Computing Testing Lab
Hydraulics Lab
See also
List of Engineering Colleges in Kerala
Sree Narayana Guru
Sree Narayana Guru College of Advanced Studies, Nattika
SCMS School of Engineering and Technology
Toc H Institute of Science and Technology
Adi Shankara Institute of Engineering Technology
References
External links
Engineering colleges in Kochi
Sree Narayana College, Kollam
2002 establishments in Kerala
Educational institutions established in 2002
|
21368888
|
https://en.wikipedia.org/wiki/Philosophy%20of%20logic
|
Philosophy of logic
|
Philosophy of logic is the area of philosophy that studies the scope and nature of logic. It investigates the philosophical problems raised by logic, such as the presuppositions often implicitly at work in theories of logic and in their application. This involves questions about how logic is to be defined and how different logical systems relate to each other. It includes the study of the nature of the fundamental concepts used by logic and the relation of logic to other disciplines. According to a common characterization, philosophical logic is the part of the philosophy of logic that studies the application of logical methods to philosophical problems, often in the form of extended logical systems like modal logic. But other theorists draw the distinction between the philosophy of logic and philosophical logic differently or not at all. Metalogic is closely related to the philosophy of logic as the discipline investigating the properties of formal logical systems, like consistency and completeness.
Various characterizations of the nature of logic are found in the academic literature. Logic is often seen as the study of the laws of thought, correct reasoning, valid inference, or logical truth. It is a formal science that investigates how conclusions follow from premises in a topic-neutral manner, i.e. independent of the specific subject matter discussed. One form of inquiring into the nature of logic focuses on the commonalities between various logical formal systems and on how they differ from non-logical formal systems. Important considerations in this respect are whether the formal system in question is compatible with fundamental logical intuitions and whether it is complete. Different conceptions of logic can be distinguished according to whether they define logic as the study of valid inference or logical truth. A further distinction among conceptions of logic is based on whether the criteria of valid inference and logical truth are specified in terms of syntax or semantics.
Different types of logic are often distinguished. Logic is usually understood as formal logic and is treated as such for most of this article. Formal logic is only interested in the form of arguments, expressed in a formal language, and focuses on deductive inferences. Informal logic, on the other hand, addresses a much wider range of arguments found also in natural language, which include non-deductive arguments. The correctness of arguments may depend on other factors than their form, like their content or their context. Various logical formal systems or logics have been developed in the 20th century and it is the task of the philosophy of logic to classify them, to show how they are related to each other, and to address the problem of how there can be a manifold of logics in contrast to one universally true logic. These logics can be divided into classical logic, usually identified with first-order logic, extended logics, and deviant logics. Extended logics accept the basic formalism and the axioms of classical logic but extend them with new logical vocabulary. Deviant logics, on the other hand, reject certain core assumptions of classical logic and are therefore incompatible with it.
The philosophy of logic also investigates the nature and philosophical implications of the fundamental concepts of logic. This includes the problem of truth, especially of logical truth, which may be defined as truth depending only on the meanings of the logical terms used. Another question concerns the nature of premises and conclusions, i.e. whether to understand them as thoughts, propositions, or sentences, and how they are composed of simpler constituents. Together, premises and a conclusion constitute an inference, which can be either deductive and ampliative depending on whether it is necessarily truth-preserving or introduces new and possibly false information. A central concern in logic is whether a deductive inference is valid or not. Validity is often defined in terms of necessity, i.e. an inference is valid if and only if it is impossible for the premises to be true and the conclusion to be false. Incorrect inferences and arguments, on the other hand, fail to support their conclusion. They can be categorized as formal or informal fallacies depending on whether they belong to formal or informal logic. Logic has mostly been concerned with definitory rules, i.e. with the question of which rules of inference determine whether an argument is valid or not. A separate topic of inquiry concerns the strategic rules of logic: the rules governing how to reach an intended conclusion given a certain set of premises, i.e. which inferences need to be drawn to arrive there.
The metaphysics of logic is concerned with the metaphysical status of the laws and objects of logic. An important dispute in this field is between realists, who hold that logic is based on facts that have mind-independent existence, and anti-realists like conventionalists, who hold that the laws of logic are based on the conventions governing the use of language. Logic is closely related to various disciplines. A central issue in regard to ontology concerns the ontological commitments associated with the use of logic, for example, with singular terms and existential quantifiers. An important question in mathematics is whether all mathematical truths can be grounded in the axioms of logic together with set theory. Other related fields include computer science and psychology.
Definition and related disciplines
Philosophy of logic is the area of philosophy that studies the nature of logic. Like many other disciplines, logic involves various philosophical presuppositions which are addressed by the philosophy of logic. The philosophy of logic can be understood in analogy to other discipline-specific branches of philosophy: just like the philosophy of science investigates philosophical problems raised by science, so the philosophy of logic investigates philosophical problems raised by logic.
An important question studied by the philosophy of logic is how logic is to be defined, for example, in terms of valid inference or of logical truth. This includes the issue of how to distinguish logical from non-logical formal systems. It is especially relevant for clarifying the relation between the various proposed logical systems, both classical and non-classical, and for evaluating whether all of these systems actually qualify as logical systems. The philosophy of logic also investigates how to understand the most fundamental concepts of logic, like truth, premises, conclusions, inference, argument, and validity. It tries to clarify the relation between logic and other fields, such as ontology, mathematics, and psychology.
The philosophy of logic is closely related to philosophical logic but there is no general agreement about how these disciplines stand to each other. Some theorists use these two terms for the same discipline while others see them as distinct disciplines. According to the latter view, philosophical logic contrasts with the philosophy of logic in that it is usually seen as the application of logical methods to philosophical problems, often by developing deviant or extended logics. In this sense, philosophical logic is one area of inquiry within the philosophy of logic, i.e. a part of the general study of philosophical problems raised by logic. But this form of distinction is not universally accepted and some authors have proposed different characterizations. The intimate connection between logic and philosophy is also reflected in the fact that many famous logicians were also philosophers. The philosophy of logic is closely related to metalogic but not identical to it. Metalogic investigates the properties of formal logical systems, like whether a given logical system is consistent or complete. It usually includes the study of the semantics and syntax of formal languages and formal systems.
Nature of logic
The term "logic" is based on the Greek word "", which is associated with various different senses, such as reason, discourse, or language. There are many disagreements about what logic is and how it should be defined. Various characteristics are generally ascribed to logic, like that it studies the relation between premises and conclusions and that it does so in a topic-neutral manner. An important task of the philosophy of logic is to investigate the criteria according to which a formal system should count as logic. Different conceptions of logic understand it as either based on valid inference or logical truth. The criteria of valid inference and logical truth can themselves be specified in different ways: based on syntactic or semantic considerations.
General characteristics
Traditionally, logic is often understood as the discipline investigating laws of thought. One problem for this characterization is that logic is not an empirical discipline studying the regularities found in actual human thinking: this subject belongs to psychology. This is better captured by another characterization sometimes found in the literature: that logic concerns the laws of correct thinking or, more specifically, correct reasoning. This reflects the practical significance of logic as a tool to improve one's reasoning by drawing good inferences and becoming aware of possible mistakes. Logic has also been defined as the science of valid argumentation. This mirrors the definition in terms of reasoning since argumentation may be understood as an outward expression of inward reasoning.
Logic is often seen as a formal foundation of all knowledge. As a formal science, it stands in contrast to the material or empirical sciences, like physics or biology, since it is mainly concerned with entailment relations between propositions but not with whether these propositions actually are true. For example, deducing from the proposition "all moons are made of cheese" that "Earth's moon is made of cheese" is a valid inference. The error in this example is due to a false premise belonging to empirical astronomy.
A central feature of logic is that it is topic-neutral. This means that it is concerned with the validity of arguments independent of the subject matter of these arguments. In this sense, regular sciences are concerned with correct reasoning within a specific area of inquiry, for example, concerning material bodies for classical mechanics or living beings for biology, while logic is concerned with correct reasoning in general as applicable to all these disciplines. One problem with this characterization is that it is not always clear how the terms "topic-neutral" and "subject matter" are to be understood in this context. For example, it could be argued that first-order logic has individuals as its subject matter, due to its usage of singular terms and quantifiers, and is therefore not completely topic-neutral. A closely related characterization holds that logic is concerned with the form of arguments rather than their contents. On this view, the regular sciences could be seen as seeking true premises while logic studies how to draw conclusions from these or any premises. But this characterization also has its problems due to difficulties in distinguishing between form and content. For example, since temporal logic talks about time, this would lead to the implausible conclusion that time belongs to the form and not to the content of arguments. These difficulties have led some theorists to doubt that logic has a clearly specifiable scope or an essential character.
Logical and non-logical formal systems
One approach to determining the nature of logic is to study the different formal systems, referred to as "logics", in order to determine what is essential to all of them, i.e. what makes them logics. Formal systems of logic are systematizations of logical truths based on certain principles called axioms. As for formal logic, a central question in the philosophy of logic is what makes a formal system into a system of logic rather than a collection of mere marks together with rules for how they are to be manipulated. It has been argued that one central requirement is that the marks and how they are manipulated can be interpreted in such a way as to reflect the basic intuitions about valid arguments. This would mean, for example, that there are truth values and that the behavior of some marks corresponds to that of logical operators such as negation or conjunction. Based on this characterization, some theorists hold that certain formal systems, such as three-valued logic or fuzzy logic, stray too far from the common concept of logic to be considered logical systems. Such a position may be defended based on the idea that by rejecting some basic logical assumptions, they include a too radical departure from fundamental logical intuitions to be considered logics. It has been suggested that rejecting the principle of the bivalence of truth, i.e. that propositions are either true or false, constitutes such a case.
Metalogicians sometimes hold that logical completeness is a necessary requirement of logical systems. A formal system is complete if it is possible to derive from its axioms every theorem belonging to it. This would mean that only formal systems that are complete should be understood as constituting logical systems. One controversial argument for this approach is that incomplete theories cannot be fully formalized, which stands in contrast to the formal character of logic. On this view, first-order logic constitutes a logical system. But this would also mean that higher-order "logics" are not logics strictly speaking, due to their incompleteness.
Conceptions based on valid inference or logical truth
Logic is often defined as the study of valid or correct inferences. On this conception, it is the task of logic to provide a general account of the difference between correct and incorrect inferences. An inference is a set of premises together with a conclusion. An inference is valid if the conclusion follows from the premises, i.e. if the truth of the premises ensures the truth of the conclusion. Another way to define logic is as the study of logical truth. Logical truth is a special form of truth since it does not depend on how things are, i.e. on which possible world is actual. Instead, a logically true proposition is true in all possible worlds. Their truth is based solely on the meanings of the terms they contain, independent of any empirical matters of fact. There is an important link between these two conceptions: an inference from the premises to a conclusion is valid if the material conditional from the premises to the conclusion is logically true. For example, the inference from "roses are red and grass is green" to "roses are red" is valid since the material conditional "if roses are red and grass is green, then roses are red" is logically true.
Conceptions based on syntax or semantics
Whether logic is defined as the study of valid inference or of logical truth leaves open their exact criteria. There are two important ways of specifying these criteria: the syntactic and the semantic approach, sometimes also called the deductive-theoretic and the model-theoretic approach. In this sense, a logic can be defined as a formal language together with either a deductive-theoretic or a model-theoretic account of logical consequence. The syntactic approach tries to capture these features based only on syntactic or formal features of the premises and the conclusion. This is usually achieved by expressing them through a formal symbolism to make these features explicit and independent of the ambiguities and irregularities of natural language. In this formalism, the validity of arguments only depends on the structure of the argument, specifically on the logical constants used in the premises and the conclusion. On this view, a proposition is a logical consequence of a group of premises if and only if the proposition is deducible from these premises. This deduction happens by using rules of inference. This means that for a valid argument, it is not possible to produce true premises with a false conclusion by substituting their constituents with elements belonging to similar categories while keeping the logical constants in place. In the case of logical truths, such a substitution cannot make them false. Different sets of rules of inference constitute different deductive systems, for example, the ones associated with classical logic or with intuitionistic logic. So whether the proposition is a logical consequence depends not just on the premises but also on the deductive system used.
A problem with the syntactic approach is that the use of formal language is central to it. But the problem of logic, i.e. of valid inference and logical truth, is found not just in formal languages but also in natural languages. However, even within the scope of formal languages, the problem of truth poses a variety of problems, which often call for a richer meta-language to be properly addressed. This threatens the syntactic approach even when restricted to formal languages. Another difficulty is posed by the fact that it is often not clear how to distinguish formal from non-formal features, i.e. logical from non-logical symbols. This distinction lies at the very heart of the syntactic approach due to its role in the definition of valid inference or logical truth.
The semantic approach, on the other hand, focuses on the relation between language and reality. In logic, the study of this relationship is often termed model theory. For this reason, the semantic approach is also referred to as the model-theoretic conception of logic. It was initially conceived by Alfred Tarski and characterizes logical truth not in relation to the logical constants used in sentences, but based on set-theoretic structures that are used to interpret these sentences. The idea behind this approach is that sentences are not true or false by themselves but only true or false in relation to an interpretation. Interpretations are usually understood in set-theoretic terms as functions between symbols used in the sentence and a domain of objects. Such a function assigns individual constants to individual elements of the domain and predicates to tuples of elements of the domain. An interpretation of a sentence (or of a theory comprising various sentences) is called a model of this sentence if the sentence is true according to this interpretation. A sentence is logically true if it is true in every interpretation, i.e. if every interpretation is a model of this sentence. In this case, no matter how the interpretation-function and the domain of objects to which it points are defined, the sentence is always true. If interpretations are understood in terms of possible worlds, logically true sentences can be seen as sentences that are true in every possible world. Expressed in terms of valid arguments: an argument is valid if and only if its conclusion is true in all possible worlds in which its premises are true.
This conception avoids the problems of the syntactic approach associated with the difficulty of distinguishing between logical and non-logical symbols. But it faces other problems of its own. On the one hand, it shares the problem with the syntactic approach of being in need of a meta-language to address the problem of truth. It therefore presupposes a formal language that can be studied from a perspective outside itself. This poses problems for generalizing its insights to the logic of language in general as an all-encompassing medium. On the other hand, it ignores the relationship between language and world, since it defines truth based on the interpretation that takes place only between symbols and set-theoretic objects.
Types of logics
The problem of having to choose between a manifold of rival logical systems is rather recent. For a long time in history, Aristotelian syllogistics was treated as the canon of logic and there were very few substantial improvements to it for over two thousand years until the works of George Boole, Bernard Bolzano, Franz Brentano, Gottlob Frege, and others. These developments were often driven by a need to increase the expressive flexibility of logic and to adapt it to specific areas of usage. A central problem in the philosophy of logic, raised by the contemporary proliferation of logical systems, is to explain how these systems are related to each other. This brings with it the question of why all these formal systems deserve the title "logic". Another question is whether only one of these systems is the right one or how a multiplicity of logical systems is possible instead of just one universal logic. Monism is the thesis that only one logic is correct while pluralism allows different alternative logical systems to be correct for different areas of discourse. It has also been suggested that there may be one universal concept of logic that underlies and unifies all the different logical systems.
Formal and informal
Logic and the philosophy of logic have traditionally focused primarily on formal arguments, i.e. arguments expressed in a formal language. But they also include the study of informal arguments found in natural language. Formal logic is usually seen as the paradigmatic form of logic but various modern developments have emphasized the importance of informal logic for many practical purposes where formal logic alone is unable to solve all issues by itself. Both formal and informal logic aim at evaluating the correctness of arguments. But formal logic restricts itself concerning the factors that are used in order to provide exact criteria for this evaluation. Informal logic tries to take various additional factors into account and is therefore relevant for many arguments outside the scope of formal logic, but does so at the cost of precision and general rules. Arguments that fail this evaluation are called fallacies. Formal fallacies are fallacies within the scope of formal logic whereas informal fallacies belong to informal logic.
Formal logic is concerned with the validity of inferences or arguments based only on their form, i.e. independent of their specific content and the context in which they are used. This usually happens through abstraction by seeing particular arguments as instances of a certain form of argument. Forms of arguments are defined by how their logical constants and variables are related to each other. In this way, different arguments with very different contents may have the same logical form. Whether an argument is valid only depends on its form. An important feature of formal logic is that for a valid argument, the truth of its premises ensures the truth of its conclusion, i.e. it is impossible for the premises to be true and the conclusion to be false.
A serious problem associated with the usage of formal logic for expressing theories from various fields is that these theories have to be translated into a formal language, usually the language of first-order logic. This is necessary since formal logic is only defined for specific formal language: it is therefore not directly applicable to many arguments expressed differently. Such translations can be challenging since formal languages are often quite restrictive. For example, they frequently lack many of the informal devices found in natural language. One recurrent problem concerns the word "is" in the English language, which has a variety of meanings depending on the context, such as identity, existence, predication, class-inclusion, or location.
Informal logic, on the other hand, has a more concrete orientation in that it tries to evaluate whether a specific instance of an argument is good or bad. This brings with it the need to study not just the general form of the argument in question, but also the contents used as premises of this argument and the context in which this argument is used. This means that the same argument may be both good, when used in one context, and bad, when used in another context. For example, a strawman argument tries to overcome the opponent's position by attributing a weak position to them and then proving this position to be false. In a context where the opponent does not hold this position, the argument is bad, while it may be a good argument against an opponent who actually defends the strawman position. Arguments studied by informal logic are usually expressed in natural language.
Informal logic does not face the need to translate natural language arguments into a formal language in order to be able to evaluate them. This way, it avoids various problems associated with this translation. But this does not solve many of the problems that the usage of natural language brings with it, like ambiguities, vague expressions, or implicitly assuming premises instead of explicitly stating them. Many of the fallacies discussed in informal logic arise directly from these features. This concerns, for example, the fallacies of ambiguity and of presumption.
Classical and non-classical
Within the domain of formal logic, an important distinction is between classical and non-classical logic. The term classical logic refers primarily to propositional logic and first-order logic. It is the dominant logical system accepted and used by most theorists. But the philosophy of logic is also concerned with non-classical or alternative logics. They are sometimes divided into extended logics and deviant logics. Extended logics are extensions of classical logic, i.e. they accept the basic formalism and axioms of classical logic but extend them with new logical vocabulary, like introducing symbols for "possibility" and "necessity" in modal logic or symbols for "sometimes" and "always" in temporal logic. Deviant logics, on the other hand, reject certain core assumptions of classical logic. They use axioms different from classical logic, which are often more limiting concerning which inferences are valid. They are "deviant" in the sense that they are incompatible with classical logic and may be seen as its rivals.
Classical
The term classical logic refers primarily to propositional logic and first-order logic. It is usually treated by philosophers as the paradigmatic form of logic and is used in various fields. It is concerned with a small number of central logical concepts and specifies the role these concepts play in making valid inferences. These core notions include quantifiers, expressing ideas like "all" and "some", and propositional connectives, like "and", "or", and "if-then". Among the non-logical concepts, an important distinction is between singular terms and predicates. Singular terms stand for objects and predicates stand for properties of or relations between these objects. In this respect, first-order logic differs from traditional Aristotelian logic, which lacked predicates corresponding to relations. First-order logic allows quantification only over individuals, in contrast to higher-order logic, which allows quantification also over predicates.
Extended
Extended logics accept the axioms and the core vocabulary of classical logic. This is reflected in the fact that the theorems of classical logic are valid in them. But they go beyond classical logic by including additional new symbols and theorems. The goal of these changes is usually either to apply logical treatment to new areas or to introduce a higher level of abstraction, for example, in the form of quantification applied not just to singular terms but also to predicates or propositions, or through truth predicates. In this sense, deviant logics are usually seen as rivals to classical logic while extended logics are supplements to classical logic. Important examples of extended logics include modal logic and higher-order logic.
The term "modal logic", when understood in its widest sense, refers to a variety of extended logics, such as alethic, deontic, or temporal modal logic. In its narrow sense, it is identical with alethic modal logic. While classical logic is only concerned with what is true or false, alethic modal logic includes new symbols to express what is possibly or necessarily true or false. These symbols take the form of sentential operators. Usually, the symbols and are used to express that the sentence following them is possibly or necessarily true. Modal logics also include various new rules of inferences specifying how these new symbols figure in valid arguments. One example is the formula , i.e. that if something is necessarily true then it is also possibly true. The other forms of modal logic besides alethic modal logic apply the same principles to different fields. In deontic modal logic, the symbols and are used to express which actions are permissible or obligatory; in temporal logic, they express what is the case at some time or at every time; in epistemic logic, they express what is compatible with a person's beliefs or what this person knows.
Various rules of inference have been suggested as the basic axioms of the different modal logics but there is no general agreement on which are the right ones. An influential interpretation of modal operators, due to Saul Kripke, understands them as quantifiers over possible worlds. A possible world is a complete and consistent way how things could have been. On this view, to say that something is necessarily true is to say that it is true in all accessible possible worlds. One problem for this type of characterization is that they seem to be circular since possible worlds are themselves defined in terms of modal notion, i.e. as ways how things could have been.
Even when restricted to alethic modal logic, there are again different types of possibility and necessity that can be meant by these terms. For example, according to physical modality, it is necessary that an object falls if dropped since this is what the laws of nature dictate. But according to logical modality, this is not necessary since the laws of nature might have been different without leading to a logical contradiction.
Higher-order logics extend classical first-order predicate logic by including new forms of quantification. In first-order logic, quantification is restricted to individuals, like in the formula (there are some apples that are sweet). Higher-order logics allow quantification not just over individuals but also over predicates, as in (there are some qualities that Mary and John share). The increased expressive power of higher-order logics is especially relevant for mathematics. For example, an infinite number of axioms is necessary for Peano arithmetic and Zermelo-Fraenkel set theory in first-order logic, while second-order logic only needs a handful of axioms to do the same job. But this increased expressive power comes at certain costs. On the one hand, higher-order theories are incomplete: it is not possible to prove every true sentence based on the axioms of this theory. For theories in first-order logic, on the other hand, this is possible. Another drawback is that higher-order logics seem to be committed to a form of Platonism since they quantify not just over individuals but also over properties and relations.
Deviant
Deviant logics are forms of logic in that they have the same goal as classical logic: to give an account of which inferences are valid. They differ from classical logic by giving a different account. Intuitionistic logic, for example, rejects the law of excluded middle, which is a valid form of inference in classical logic. This rejection is based on the idea that mathematical truth depends on verification through a proof. The law fails for cases where no such proof is possible, which exist in every sufficiently strong formal system, according to Gödel's incompleteness theorems. Free logic differs from classical logic since it has fewer existential presuppositions: it allows non-denoting expressions, i.e. individual terms that do not refer to objects within the domain. A central motivation for this type of modification is that free logic can be used to analyze discourse with empty singular terms, like in the expression "Santa Clause does not exist". Many-valued logic is a logic that allows for additional truth values besides true and false in classical logic. In this sense, it rejects the principle of the bivalence of truth. In a simple form of three-valued logic, for example, a third truth value is introduced: undefined.
Fundamental concepts
Truth
In logic, truth is usually seen as a property of propositions or sentences. It plays a central role in logic since validity is often defined in terms of truth: an inference is valid if and only if it is impossible for its premises to be true and its conclusion to be false. Theories of truth try to characterize the nature of truth. According to correspondence theories, a proposition is true if it corresponds to reality, i.e. if it represents things how they actually are. Coherence theories, on the other hand, identify truth with coherence. On this view, a proposition is true if it is a coherent part of a specified set of propositions, i.e. if these propositions are consistent with each other and provide mutual inferential support for each other. According to pragmatic theories of truth, whether a proposition is true depends on its relation to practice. Some versions claim that a proposition is true if believing it is useful, if it is the ideal result of an endless inquiry, or if it meets the standards of warranted assertibility. Deflationary theories of truth see truth as a rather empty notion that lacks an interesting nature of its own. On this view, to assert that a proposition is true is the same as asserting the proposition by itself. Other important topics in the philosophy of logic concerning truth are the value of truth, the liar paradox, and the principle of bivalence of truth.
Logical truth
Central to logic is the notion of logical truth. Logical truth is often understood in terms of the analytic-synthetic distinction: a proposition is analytically true if its truth only depends on the meanings of the terms composing it. Synthetic propositions, on the other hand, are characterized by the fact that their truth depends on non-logical or empirical factors. This is sometimes expressed by stating that analytical truths are tautologies, whose denial would imply a contradiction, while it is possible for synthetic propositions to be true or false. In this sense, the proposition "all bachelors are unmarried" is analytically true since being unmarried is part of how the term "bachelor" is defined. The proposition "some bachelors are happy", on the other hand, is synthetically true since it depends on empirical factors not included in the meaning of its terms. But whether this distinction is tenable has been put into question. For example, Willard Van Orman Quine has argued that there are no purely analytic truths, i.e. that all propositions are to some extent empirical. But others have explicitly defended the analytic-synthetic distinction against Quine's criticism.
But whether logical truths can be identified with analytical truths is not always accepted. A different approach characterizes logical truths regarding a small subset of the meanings of all terms: the so-called logical constants or syncategoremata. They include propositional connectives, like "and" or "if-then", quantifiers, like "for some" or "for all", and identity. Propositional logic is only concerned with truth in virtue of propositional connectives, while predicate logic also investigates truths based on the usage of quantifiers and identity. Extended logics introduce even more logical constants, like possibility and necessity in modal logic. A sentence is true in virtue of the logical constants alone if all non-logical terms can be freely replaced by other terms of the appropriate type without affecting any change in the truth value of the sentence. For example, the sentence "if it rains, then it rains" is true due to its logical form alone because all such replacements, like substituting the expression "Socrates is wise" for the expression "it rains", also result in true sentences. One problem with this characterization of logic is that it is not always clear how to draw the distinction between logical constants and other symbols. While there is little controversy in the paradigmatic cases, there are various borderline cases in which there seem to be no good criteria for deciding the issue.
Premises and conclusions
There are various discussions about the nature of premises and conclusions. It is widely agreed that they have to be bearers of truth, i.e. that they are either true or false. This is necessary so they can fulfill their logical role. They are traditionally understood as thoughts or propositions, i.e. as mental or abstract objects. This approach has been rejected by various philosophers since it has proven difficult to specify clear identity criteria for these types of entities. An alternative approach holds that only sentences can act as premises and conclusions. Propositions are closely related to sentences since they are the meaning of sentences: sentences express propositions. But this approach faces various problems of its own. One is due to the fact that the meaning of sentences usually is context-dependent. Because of this, it could be the case that the same inference is valid in one context and invalid in another. Another problem consists in the fact that some sentences are ambiguous, i.e. that it sometimes depends on one's interpretation whether an inference is valid or not.
An important aspect both of propositions and of sentences is that they can be either simple or complex. Complex propositions are made up of simple propositions that are linked to each other through propositional connectives. Simple propositions do not have other propositions as their parts, but they are usually understood as being constituted by other entities as well: by subpropositional parts like singular terms and predicates. For example, the simple proposition "Mars is red" is made of the singular term "Mars", to which the predicate "red" is applied. In contrast, the proposition "Mars is red and Venus is white" is made up of two propositions connected by the propositional connective "and". In the simplest case, these connectives are truth-functional connectives: the truth value of the complex proposition is a function of the truth values of its constituents. So the proposition "Mars is red and Venus is white" is true because the two propositions constituting it are true. The truth value of simple propositions, on the other hand, depends on their subpropositional parts. This is usually understood in terms of reference: their truth is determined by how their subpropositional parts are related to the world, i.e. to the extra-linguistic objects they refer to. This relation is studied by theories of reference, which try to specify how singular terms refer to objects and how predicates apply to these objects. In the case of singular terms, popular suggestions include that the singular term refers to its object either through a definite description or based on causal relations with it. In the former sense, the name "Aristotle" may be understood as the definite description "the pupil of Plato who taught Alexander". As for predicates, they are often seen as referring either to universals, to concepts, or to classes of objects.
Inference and argument
An inference is the process of reasoning from premises to a conclusion. The relation between the premises and the conclusion is called "entailment" or "logical consequence". An argument consists of the premises, the conclusion, and the relation between them. But the terms "inference", "argument", "entailment", and "logical consequence" are often used interchangeably. A complex argument is an argument involving several steps, in which the conclusions of earlier steps figure as the premises of the following steps. Inferences and arguments can be correct or incorrect. This depends on whether the premises actually support the conclusion or not, i.e. on whether the conclusion follows from the premises. For example, it follows from "Kelly is not both at home and at work" and "Kelly is at home" that "Kelly is not at work". But it does not follow that "Kelly is a football fan".
An important distinction among inferences is between deductive and ampliative inferences, also referred to as monotonic and non-monotonic inferences. According to Alfred Tarski, deductive inference has three central features: (1) it is formal, i.e. it depends only on the form of the premises and the conclusion; (2) it is a priori, i.e. no sense experience is needed to determine whether it obtains; (3) it is modal, i.e. that it holds by necessity for the given propositions, independent of any other circumstances. Deductive inferences are necessarily truth-preserving: the conclusion cannot be false if all the premises are true. For this reason, they are unable to introduce new information not already found in the premises and are uninformative in this sense. One problem with characterizing deductive inferences as uninformative is that this seems to suggest that they are useless, i.e. it fails to explain why someone would use or study them. This difficulty can be addressed by distinguishing between depth information and surface information. On this view, deductive logic is uninformative on the level of depth information but may still lead to surprising results on the level of surface information by presenting certain aspects in a new way.
Ampliative inferences, on the other hand, are informative by aiming to provide new information. This happens at the cost of losing the necessarily truth-preserving nature. The most prominent form of ampliative inference is induction. An inductive inference involves particular propositions as premises, which are used to infer either one more particular proposition or a generalization as the conclusion. Deductive inferences are the paradigmatic form of inference and are the main focus of logic. But many inferences drawn in the empirical sciences and in everyday discourse are ampliative inferences.
Validity and fallacies
A central problem in logic is how to distinguish correct or valid arguments from incorrect or invalid ones. The philosophy of logic investigates issues like what it means that an argument is valid. This includes the question of how this type of support is to be understood or of what the criteria are under which a premise supports a conclusion. Some logicians define valid inference or entailment in terms of logical necessity: the premises entail the conclusion if it is impossible for the premises to be true and the conclusion to be false. This can also be expressed by saying that the conjunction of the premises and the negation of the conclusion is logically impossible. This conception brings with it the principle of explosion, i.e. that anything follows from a contradiction. But valid inferences can also be characterized in terms of rules of inference. Rules of inference govern the transition from the premises to the conclusion. On this view, an inference is valid if it is in accordance with an appropriate rule of inference.
Closely related to the notion of valid inference is that of confirmation. Valid inferences belong to formal logic and is associated with deductively valid arguments. But many arguments found in the sciences and in everyday discourse support their conclusion without ensuring its truth. They fall in the purview of informal logic and can also be divided into good and bad arguments. In this sense, for example, observations may act as empirical evidence supporting a scientific hypothesis. This is often understood in terms of probability, i.e. that the evidence increases the likelihood that the hypothesis is true.
Of special interest are the so-called fallacies, i.e. incorrect arguments that appear to be correct. They are incorrect because the premises do not support the conclusion in the assumed way. Due to their misleading appearance, they can seduce people into accepting and using them. Often three factors are identified as the sources of the error: form, content, and context. The form of an argument refers to its structure, i.e. which rule of inference it employs. Errors on the level of form involve the use of invalid rules of inference. An argument that is incorrect on the level of content uses false propositions as its premises. The context of an argument refers to the situation in which it is used and the role it is supposed to play. An argument can be fallacious if it fails to play the role intended for it, as in the strawman fallacy, when the arguer attacks an overly weak position not held by the opponent.
An important distinction among fallacies can be drawn based on these sources of error: that between formal and informal fallacies. Formal fallacies pertain to formal logic and involve only errors of form by employing an invalid rule of inference. Denying the antecedent is one type of formal fallacy, for example, "If Othello is a bachelor, then he is male. Othello is not a bachelor. Therefore, Othello is not male". Informal fallacies belong to informal logic and their main source of error is found on the level of content and context. False dilemmas, for example, are based on a false disjunctive premise that oversimplifies reality by excluding viable alternatives, as in "Stacey spoke out against capitalism; therefore, she must be a communist".
Since logic evaluates arguments as good or bad, logic faces the problem of the nature and justification of the norms guiding these evaluations. This is similar to issues found in metaethics about how to justify moral norms. One approach to this issue is to characterize the norms of logic as generalizations of the inferential practices found in natural language or the sciences. This way, justification is inherited from the evaluations of good and bad inferences used in the corresponding field.
Definitory and strategic rules
An important distinction among the rules of logic is that between definitory and strategic rules. Rules of inferences are definitory rules: they govern which inferences are valid. And while it has been the main objective of logic to distinguish valid from invalid inferences, there is also a secondary objective often associated with logic: to determine which inferential steps are needed to prove or disprove a given proposition based on a set of premises. This is the domain of strategic rules. The rules of inference specify which steps are allowed but they remain silent on which steps need to be taken to reach a certain conclusion. The difference between definitory and strategic rules is found not only in logic but in various games as well. In chess, for example, the definitory rules specify that bishops may only move diagonally while strategic rules describe how the allowed moves may be used to win a game, e.g. by controlling the center or by protecting one's king. Following definitory rules determines whether one plays chess or something else while following strategic rules determines whether one is a good or a bad chess player. Both definitory and strategic rules are to be distinguished from empirical descriptive rules, which generalize how people actually draw inferences, whether correct or incorrect. In this sense, definitory rules are permissive and strategic rules are prescriptive while empirical generalizations are descriptive. Violating the definitory rules of logic results in committing fallacies. It has been argued that the almost exclusive focus of logicians on the definitory rules of logic is not justified. On this view, more emphasis should be given to strategic rules instead, since many applications of logic, like the problem of rational belief change, depend more on strategic rules than on definitory rules.
Metaphysics of logic
The philosophy of logic is in many ways closely related to the philosophy of mathematics, especially in relation to their metaphysical aspects. The metaphysics of logic is concerned with the metaphysical status of its objects and the laws governing them. The theories within the metaphysics of logic can roughly be divided into realist and non-realist positions.
Logical realists hold that the laws of logic are objective, i.e. independent of humans and their ways of thinking. On this view, the structures found in logic are structures of the world itself. According to a definition proposed by Sandra LaPointe, logical realism consist of two theses: that there are logical facts and that they are independent of our cognitive and linguistic make-up and practices. Logical realism is often interpreted from the perspective of Platonism, i.e. that there is an intelligible realm of abstract objects that includes the objects of logic. On this view, logic is not invented but discovered. An important consequence of this position is that there is a clear gap between the facts of logic themselves and our beliefs about these facts. One difficulty of this position consists in clarifying which sense of independence is meant when saying that logic is independent of humans. If it is understood in the strictest sense possible, no knowledge of it would be possible since a fully independent reality could play no part in human consciousness. Another problem is to explain the relation between the one world and the many different logical systems proposed. This would suggest that there is only one true logic and all other logical systems are either false or incomplete.
Logical realism is rejected by anti-realists, who hold that logic does not describe an objective feature of reality. Anti-realism about logic often takes the form of conceptualism or psychologism, in which the objects of logic consist in mental conceptions or the logical laws are identified with psychological laws. This can include the thesis that the laws of logic are not knowable a priori, as is often held, but that they are discovered through the methods of experimental inquiry. An argument for psychologism is based on the idea that logic is a sub-discipline of psychology: it studies not all laws of thought, but only the subset of laws corresponding to valid reasoning. Another argument focuses on the thesis that we learn about logical truths through the feeling of self-evidence, which is in turn studied by psychology. Various objections to psychologism have been raised, especially in German philosophy around the turn of the 20th century in the so-called "Psychologismus-Streit". One objection focuses on the thesis that the laws of logic are known a priori, which is not true for the empirical laws studied by psychology. Another points out that psychological laws are usually vague, whereas logic is an exact science with clear laws.
Conventionalism is another form of anti-realism, in which the logical truths depend on the meanings of the terms used, which in turn depend on linguistic conventions adopted by a group of agents. One problem for this position consists in providing a clear definition of the term "convention". Conventions are widely observed regularities. But not every widely observed regularity is a convention: conventions include a certain normative factor that distinguishes right from wrong behavior, whereas irregular behavior is not automatically wrong. Another problem concerns the fact that conventions are contingent, while logical truths are necessary. This casts doubt on the possibility of defining logical truth in terms of convention unless a plausible explanation could be given how contingent conventions can ground necessary truths.
Relation to other disciplines
Ontology
A central issue in ontology is the problem of existence, i.e. whether an entity or a certain kind of entity exists. According to some theorists, the main goal of ontology is just to determine what exists and what does not exist. The issue of existence is closely related to singular terms, like names, and existential quantifiers (): it is often held that these devices carry existential presuppositions or ontological commitments with them. On this view, sentences like and involve ontological commitments to the existence of apples and of Pegasus, respectively. The most famous defender of this approach is Willard Van Orman Quine, who argues that the ontological commitments of any theory can be determined by translating it into first-order logic and reading them off from the existential quantifiers used in this translation.
One problem with this approach is that it can lead to various controversial ontological commitments. Mathematics, for example, quantifies over numbers in sentences such as "there are prime numbers between 1000 and 1010". This would mean that the ontological commitment to the existence of numbers, i.e. realism about numbers, is already built into mathematics. Another problem is due to the fact that natural language contains many names for imaginary entities, such as Pegasus or Santa Clause. But if names come with existential commitments, then sentences like "Santa Clause does not exist" would be contradictory. Within ontology, these problems are sometimes approached through Platonism or psychologism by holding that the problematic entities do exist, but only in the form of abstract or mental objects while lacking concrete or material existence. Within logic, these problems can be avoided by using certain forms of non-classical logic. Free logic, for example, allows empty singular terms, which do not denote any object in the domain and therefore carry no ontological commitments. This is often combined with an existence-predicate, which can be used to specify whether a singular term denotes an object in the domain. But talk of existence as a predicate is controversial. Opponents of this approach often point out that existence is required for an object to have any predicates at all and can therefore not be one of them.
The issue of existence brings with it its own problems in the case of higher-order logics. Second-order logic, for example, includes existential quantification not just for singular terms but also for predicates. This is often understood as entailing ontological commitments not just to regular objects but also to the properties and relations instantiated by these objects. This position is known as realism and is often rejected in contemporary philosophy due to naturalist considerations. It contrasts with nominalism, the view that only individuals exist.
Mathematics
Mathematics and logic are related in various ways. Both are considered formal sciences and in many cases, developments in these two fields happened in parallel. Propositional logic, for example, is an instance of Boolean algebra. It is often claimed that mathematics can, in principle, be grounded in only first-order logic together with set theory. Metamath is one example of such a project. It is based on 20 axioms of propositional logic, first-order predicate logic, and Zermelo–Fraenkel set theory and has already proved a significant amount of mathematical theorems based on these axioms. Closely related to this project is logicism: the thesis defended by Gottfried Wilhelm Leibniz and Gottlob Frege that arithmetic is reducible to logic alone. This would mean that any statement in arithmetic, like "2 + 2 = 4", can be expressed in purely logical terms, i.e. without using numbers or arithmetic operators like addition. In this case, all the theorems of arithmetic would be derivable from the axioms of logic. Whether this thesis is correct depends on how the term "logic" is understood. If "logic" only refers to the axioms of first-order predicate logic, it is false. But if one includes set-theory in it or higher-order logic, then arithmetic is reducible to logic.
Computer science
An important relation between logic and computer science arises from the parallels between propositional connectives of propositional logic and logic gates in computer science: they both follow the laws of Boolean algebra. Propositions are either false or true while the inputs and outputs of logic gates are termed 0 and 1. Both use truth tables to illustrate the functioning of propositional connectives and logic gates. Another important relation to logic consists in the development of logic software that can assist logicians in formulating proofs or even automate the process. Prover9 is an example of an automated theorem prover for first-order logic.
Psychology
A very close connection between psychology and logic can be drawn if logic is seen as the science of the laws of thought. One important difference between psychology and logic in the light of this characterization is that psychology is an empirical science that aims to study how humans actually think. Logic, on the other hand, has the objective of discovering the laws of correct reasoning, independently of whether actual human thinking often falls short of this ideal. The psychologist Jean Piaget applied logic to psychology by using it to identify different stages of human psychological development. On his view, the ability to reason logically only arises at a certain stage in the child's development and can be used as a criterion to distinguish it from earlier stages.
See also
Important theorists
Philosophical theories of logic
Others
References
Further reading
Haack, Susan. 1978. Philosophy of Logics. Cambridge University Press. ()
Quine, W. V. O. 2004. Philosophy of Logic. 2nd ed. Harvard University Press. ()
Alfred Tarski. 1983. The concept of truth in formalized languages, pp. 152–278, Logic,semantics, metamathematics, papers from 1923 to 1938, ed. John Corcoran (logician), Hackett,Indianapolis 1983.
Fisher Jennifer, On the Philosophy of Logic, Thomson Wadworth, 2008,
Goble, Lou, ed., 2001. (The Blackwell Guide to) Philosophical Logic. Oxford: Blackwell. .
Grayling, A. C., 1997. An Introduction to Philosophical Logic. 3rd ed. Oxford: Blackwell. .
Jacquette, Dale, ed., 2002. A Companion to Philosophical Logic. Oxford Blackwell. .
McGinn, Colin, 2000. Logical Properties: Identity, Existence, Predication, Necessity, Truth. Oxford: Oxford University Press. .
Sainsbury, Mark, 2001. Logical Forms: An Introduction to Philosophical Logic. 2nd ed. Oxford: Blackwell. .
Alfred Tarski,1983. The concept of truth in formalized languages, pp. 152–278, Logic,semantics, metamathematics, papers from 1923 to 1938, ed. John Corcoran (logician), Hackett,Indianapolis 1983.
Wolfram, Sybil, 1989. Philosophical Logic: An Introduction. London: Routledge. 290 pages. ,
Journal of Philosophical Logic, Springer SBM
Concepts in logic
Logic
Philosophical logic
Philosophy of mathematics
|
184891
|
https://en.wikipedia.org/wiki/IDEN
|
IDEN
|
Integrated Digital Enhanced Network (iDEN) is a mobile telecommunications technology, developed by Motorola, which provides its users the benefits of a trunked radio and a cellular telephone. It was called the first mobile social network by many technology industry analysts. iDEN places more users in a given spectral space, compared to analog cellular and two-way radio systems, by using speech compression and time-division multiple access (TDMA).
History
The iDEN project originally began as MIRS (Motorola Integrated Radio System) in early 1991. The project was a software lab experiment focused on the utilization of discontiguous spectrum for GSM wireless. GSM systems typically require 24 contiguous voice channels, but the original MIRS software platform dynamically selected fragmented channels in the radio frequency (RF) spectrum in such a way that a GSM telecom switch could commence a phone call the same as it would in the contiguous channel scenario.
Operating frequencies
iDEN is designed and licensed to operate on individual frequencies that may not be contiguous. iDEN operates on 25 kHz channels, but only occupies 20 kHz in order to provide interference protection via guard bands. By comparison, TDMA Cellular (Digital AMPS) is licensed in blocks of 30 kHz channels, but each emission occupies 40 kHz, and is capable of serving the same number of subscribers per channel as iDEN. iDEN uses frequency-division duplexing to transmit and receive signals separately, with transmit and receive bands separated by 39 MHz, 45 MHz, or 48 MHz depending on the frequency band being used.
iDEN supports either three or six interconnect users (phone users) per channel, and six dispatch users (push-to-talk users) per channel, using time-division multiple access. The transmit and receive time slots assigned to each user are deliberately offset in time so that a single user never needs to transmit and receive at the same time. This eliminates the need for a duplexer at the mobile end, since time-division duplexing of RF section usage can be performed.
Hardware
The first commercial iDEN handset was Motorola's L3000, which was released in 1994. Lingo, which stands for Link People on the Go, was used as a logo for its earlier handsets. Most modern iDEN handsets use SIM cards, similar to, but incompatible with GSM handsets' SIM cards. Early iDEN models such as the i1000plus stored all subscriber information inside the handset itself, requiring the data to be downloaded and transferred should the subscriber want to switch handsets. Newer handsets using SIM technology make upgrading or changing handsets as easy as swapping the SIM card. Four different sized SIM cards exist, "Endeavor" SIMs are used only with the i2000 without data, "Condor" SIMs are used with the two-digit models (i95cl, for example) using a SIM with less memory than the three-digit models (i730, i860), "Falcon" SIMs are used in the three-digit phones, (i530, i710) and will read the smaller SIM for backward compatibility, but some advanced features such as extra contact information is not supported by the older SIM cards. There is also the "Falcon 128" SIM, which is the same as the original "Falcon", but doubled in memory size, which is used on new 3 digit phones (i560, i930).
The interconnect-side of the iDEN network uses GSM signalling for call set-up and mobility management, with the Abis protocol stack modified to support iDEN's additional features. Motorola has named this modified stack 'Mobis'.
Each base site requires precise timing and location information to synchronize data across the network. To obtain and maintain this information each base site uses GPS satellites to receive a precise timing reference .
WiDEN
Wideband Integrated Digital Enhanced Network, or WiDEN, is a software upgrade developed by Motorola and partners for its iDEN enhanced specialized mobile radio (or ESMR) wireless telephony protocol. WiDEN allows compatible subscriber units to communicate across four 25 kHz channels combined, for up to 100 kbit/s of bandwidth. The protocol is generally considered a 2.5G wireless cellular technology.
History
iDEN, the platform which WiDEN upgrades, and the protocol on which it is based, was originally introduced by Motorola in 1993, and launched as a commercial network by Nextel in the United States in September 1996.
WiDEN was originally anticipated to be a major stepping stone for United States wireless telephone provider Nextel Communications and its affiliate, Nextel Partners. However, beginning with the December 2004 announcement of the Sprint Nextel merger, Nextel's iDEN network was abandoned in favor of Sprint's CDMA network. WiDEN was deactivated on the NEXTEL National Network in October 2005 when rebanding efforts in the 800 MHz band began in an effort to utilize those data channels as a way to handle more cellular phone call traffic on the NEXTEL iDEN network. The original Nextel iDEN network was finally decommissioned by Sprint on June 30, 2013 and the spectrum refarmed for use in the Sprint LTE network.
Subscriber Units
The first WiDEN-compatible device to be released was the Motorola iM240 PC card which allows raw data speeds up to 60 kbit/s. The first WiDEN-compatible telephones are the Motorola i850 and i760, which were released mid-summer 2005. The recent i850/i760 Software Upgrade enables WiDEN on both of these phones. The commercial launch of WiDEN came with the release of the Motorola i870 on 31 October 2005, however, most people never got to experience the WiDEN capability in their handsets. WiDEN is also offered in the i930/i920 Smartphone, however, Sprint shipped these units with WiDEN service disabled. Many in the cellular forum communities have found ways using Motorola's own RSS software to activate it. WiDEN was available in most places on Nextel's National Network. As stated above, it no longer is enabled on the Sprint-controlled towers. Since the Sprint Nextel merger the company determined that because Sprint's CDMA network was already 3G and going to EVDO (broadband speeds), and then EVDO Rev A, it would be redundant to keep upgrading the iDEN data network. WiDEN is considered a 2.5G technology.
Operators
Countries which had iDEN networks included United States of America, Canada, Colombia, Israel, Singapore, Saudi Arabia, El Salvador, and Guatemala.
Sprint Nextel provided iDEN service across the United States until its iDEN network was decommissioned for additional LTE network capacity on 30 June 2013.
SouthernLINC Wireless provided iDEN service across the United States until its iDEN network was decommissioned for additional LTE network capacity on 1 April 2019.
Telus provided iDEN service across most of Canada until its iDEN network was decommissioned on 29 January 2016.
Nextel Brazil provided iDEN service in Brazil until its iDEN network was decommissioned on 31 March 2018.
Nextel Argentina also provided iDEN service until decommissioning on 30 June 2019.
Colombian Avantel deactivated its iDEN service at the end of 2021.
Capitalization and pronunciation
Motorola originally referred to the platform as wiDEN, choosing to capitalize only the letters representing "Digital Enhanced Network," as it had with iDEN. However, subsequent promotion from Motorola and Nextel has indicated that the preferred capitalization is WiDEN.
The term has been pronounced, commonly, as a close combination to the words "why" and "den", or simply as the word "widen". The former is closer to the original pronunciation of iDEN, as "eye" and "den".
See also
List of device bandwidths
Motorola iDEN phone models
Push to Talk over Cellular
Radio Service Software
Trunked radio system
References
External links
List of Urban ID codes (2011)
Mobile software
Motorola
Trunked radio systems
|
33275446
|
https://en.wikipedia.org/wiki/Process%20substitution
|
Process substitution
|
In computing, process substitution is a form of inter-process communication that allows the input or output of a command to appear as a file. The command is substituted in-line, where a file name would normally occur, by the command shell. This allows programs that normally only accept files to directly read from or write to another program.
History
Process substitution was available as a compile-time option for ksh88, the 1988 version of the KornShell from Bell Labs. The rc shell provides the feature as "pipeline branching" in Version 10 Unix, released in 1990. The Bash shell provided process substitution no later than version 1.14, released in 1994.
Example
The following examples use KornShell syntax.
The Unix diff command normally accepts the names of two files to compare, or one file name and standard input. Process substitution allows one to compare the output of two programs directly:
$ diff <(sort file1) <(sort file2)
The <(command) expression tells the command interpreter to run command and make its output appear as a file. The command can be any arbitrarily complex shell command.
Without process substitution, the alternatives are:
Both alternatives are more cumbersome.
Process substitution can also be used to capture output that would normally go to a file, and redirect it to the input of a process. The Bash syntax for writing to a process is >(command). Here is an example using the tee, wc and gzip commands that counts the lines in a file with wc -l and compresses it with gzip in one pass:
$ tee >(wc -l >&2) < bigfile | gzip > bigfile.gz
Advantages
The main advantages of process substitution over its alternatives are:
Simplicity: The commands can be given in-line; there is no need to save temporary files or create named pipes first.
Performance: Reading directly from another process is often faster than having to write a temporary file to disk, then read it back in. This also saves disk space.
Parallelism: The substituted process can be running concurrently with the command reading its output or writing its input, taking advantage of multiprocessing to reduce the total time for the computation.
Mechanism
Under the hood, process substitution has two implementations. On systems which support /dev/fd (most Unix-like systems) it works by calling the pipe() system call, which returns a file descriptor $fd for a new anonymous pipe, then creating the string /dev/fd/$fd, and substitutes that on the command line. On systems without /dev/fd support, it calls mkfifo with a new temporary filename to create a named pipe, and substitutes this filename on the command line. To illustrate the steps involved, consider the following simple command substitution on a system with /dev/fd support:
$ diff file1 <(sort file2)
The steps the shell performs are:
Create a new anonymous pipe. This pipe will be accessible with something like /dev/fd/63; you can see it with a command like echo <(true).
Execute the substituted command in the background (sort file2 in this case), piping its output to the anonymous pipe.
Execute the primary command, replacing the substituted command with the path of the anonymous pipe. In this case, the full command might expand to something like diff file1 /dev/fd/63.
When execution is finished, close the anonymous pipe.
For named pipes, the execution differs solely in the creation and deletion of the pipe; they are created with mkfifo (which is given a new temporary file name) and removed with unlink. All other aspects remain the same.
Limitations
The "files" created are not seekable, which means the process reading or writing to the file cannot perform random access; it must read or write once from start to finish. Programs that explicitly check the type of a file before opening it may refuse to work with process substitution, because the "file" resulting from process substitution is not a regular file.
Additionally, up to Bash 4.4 (released September 2016), it was not possible to obtain the exit code of a process substitution command from the shell that created the process substitution.
See also
Pipeline (Unix)
Named pipe
Command substitution
Comparison of command shells
Anonymous pipe
References
Further reading
Programming language topics
Unix programming tools
|
33073761
|
https://en.wikipedia.org/wiki/State%20Wide%20Area%20Network
|
State Wide Area Network
|
A State Wide Area Network (SWAN) is one of the core infrastructure components under the National e-Governance Plan of the Government of India. The main purpose of this network is to create a dedicated Closed User Group (CUG) network and provide a secured and high speed connectivity for Government functioning and connecting State Headquarters, District Headquarters, Blocks Headquarters. The SWAN project, which forms a strategic component of the National eGovernance Plan, was approved in March 2005.
Introduction
SWAN is an approved scheme of Department of IT of Government of India claimed to bring speed, efficiency, reliability and accountability of Government-to-government functions. It is one of the core infrastructure components under NeGP and was planned as a converged backbone network for voice, video and data communications across each of the 29 States and 6 Union Territories. Common Service Centers (CSC) schemes would serve as the end delivery points. The Department of Information Technology, Government of India, is the nodal department for each SWAN implementation. The scheme was a “centralized initiative with decentralized implementation”. SWANs across the country are expected to cover at least 50000 departmental offices through 1 million (10 lacs) route kilometers of communication links.
Objectives
The SWAN aims to create a dedicated closed user group (CUG) network of minimum speed of 2 Mbit/s by connecting around 7500 points of presence (PoPs), providing data, voice & Video connectivity to more than 50,000 government offices.
Efficient Delivery : The network aims at increasing the efficiency of the government delivery mechanism and optimize the performance.
Reliable Connectivity: SWAN would provide reliable, vertical and horizontal connectivity within the State / UT administration and would facilitate electronic transactions between all the government departments.
To ensure desired quality of service (QoS) by the network operator and the bandwidth service provider, a third party audit (TPA) mechanism monitors the performance of each SWAN. The third party audit agency performs for five years from the date of final acceptance test of the network and primarily monitor the compliance of the service-level agreement (SLA) which the State / UT would enter with the Network Operator and also with the Bandwidth Service Provider.
History
Andhra Pradesh State Wide Area Network
First statewide network in the country APSWAN providing Voice, Video and Data services thereby enabling video-conferencing between the then united A.P. Chief Minister N. Chandrababu Naidu and others in the Capital with district officials was conceived and implemented in 1999.
This was executed under BOOT Model with the duration of 5+ years by United Telecoms Limited in a record time. The Network connected the united Andhra Pradesh State Secretariat at Hyderabad with the Other Government offices across the state using leased lines.
The project was taken up by the Chandrababu Naidu government as part of `Vision 2020,' initiated by him in an effort to bringing in transparency and accountability in state administration.
Gujarat State Wide Area Network
The GSWAN is the first end-to-end IP network and the largest network in the Asia Pacific region at the time of its implementation in the year 2001-02. This connects the State Secretariat in Gandhinagar, the Capital of Gujarat, with other Government offices across the state on Leased Lines.
In its first phase, 25 district headquarters and 225 Talukas were connected through a huge network of optical fiber cables to the Sachivalaya and even to ministers' residences at Gandhinagar, the state capital.
The then Chief Minister of Gujarat Narendra Modi said "Gujarat will ride GSWAN", during his inaugural speech at the Communication & Information Technology (CIT), Ahmedabad.
Jharkhand State Wide Area Network
JharNet (JharNet) is one of the largest e-governance network in South East Asia with 90% horizontal offices connected through optical fiber and wireless. United Telecoms Limited has implemented the State Wide Area Network project where the Government offices in the districts, Sub Divisional Headquarters and the Blocks are networked with the State Headquarters at Ranchi for providing Voice, Video and Data Services. JharNet made extensive use of Wireless Network as well as Optical fiber to connect to remote office apart from the traditional Leased Lines.
Kerala State Wide Area Network
For Departments like the Revenue, Registration, Rural Development, Food and Civil Supplies Department, Police etc., Kerala SWAN provides advantages like high degree of citizen interaction. In Departments like Taxes and Treasury, the revenue augmentation will be enormous.
Goa Broad Band Network
GBBN is the Next-generation network (NGN) project, which is unique and the first of its kind in India. This is also the first fully fiber based network in the country. GBBN, the Gigabit scale Next Generation Network convergence is a Quadruple play providing convergence of Broadband, Telephony, Data and Television. GBBN also involves deployment of most modern networking technologies like Gigabit Passive optical network (GPON), Fiber-to-Home (FTTH) and Fiber-to-Business (FTTB) technologies.
Architecture
The SWAN is required to be an open standards based, scalable, high capacity network to carry voice, data and video traffic between the designated State Government offices at the State, district and sub division / block levels. The connectivity to the end-user is based on either one or more of the standard technologies such as leased circuits, VSAT, radio frequency dial-up circuits or using appropriate Ethernet ports for the individual offices. The network would have single point gateways of adequate capacity connected to the Internet. The entire SWAN architecture is logically divided into two components.
Vertical component
The vertical component of SWAN is implemented using multi-tier architecture (typically, three-tier) with the State/UT Headquarters (SHQ ) connected to the each District Headquarters (DHQ) which in turn gets connected to the each Block Headquarters (BHQ).
Primary Tier consisting of SHQ
Secondary Tier consisting of DHQs
Tertiary Tier consisting of SDHQs/BHQs
Horizontal component
The Horizontal component of SWAN is composed of horizontal offices spread across the State. All vertical PoPs of SWAN will have various Horizontal connectivity. In horizontal component, the government departments at each tier are connected to the respective PoPs.
Implementation
There are two options to the State Governments for State Wide Area Network establishment. The first option is the public–private partnership (PPP) model for operation and maintenance of the Network. In the PPP model State/UT identifies a suitable PPP model and selects an appropriate Network Operator agency through a suitable competitive bid process. The second option is designating National Informatics Centre (NIC) as the prime implementation agency for the SWAN as an integral part of NICNET. In the NIC model the State / UT designates NIC as the prime implementation agency for SWAN for establishment, operation and maintenance of the Network. NIC in turn would identify a Facility Management Service (FMS) agency for the State / UT concerned, to manage day-to-day management and operation of the network. Department of IT support covers the entire cost of establishment, operation and maintenance of the SWAN for a period of five years on 100% grant basis. A majority of the States / UTs have opted for the PPP model. Bharat Sanchar Nigam Limited has been identified as a preferred bandwidth service provider for SWANs.
References
External links
Ministry of Information Technology SWAN scheme page
Common Service Center scheme connectivity options official page
PPP route to increase broadband penetration
Andhra Pradesh Chief Minister N Chandrababu Naidu unveils APSWAN
AP Chief Minister N Chandrababu Naidu inaugurated the APSWAN
Andhra Pradesh Networked
First Phase of GSWAN
Jharkhand connects all treasuries to JHARNET
KSWAN Presentation - Karnataka State Wide Area Network
GBBN details
E-government in India
|
1838997
|
https://en.wikipedia.org/wiki/ProTERM
|
ProTERM
|
ProTERM is a terminal emulator and modem program for the Apple II and Macintosh lines of personal computers, published by Intrec Software. Most popular in the late 1980s and 1990s, it was most commonly used for calling bulletin board systems (BBSes) via a computer's modem, experienced users could also Telnet into Unix server and shell account thereon and FTP and tunneling to various destinations therefrom, and once logged into a Unix shell account, other forms of telecom all across the pre-Web Internet; via VT100 terminal emulator or ANSI art, this later ushered in Graphics to the scene.
The macro Language automated a lot of this process and the ProTERM user could code macros to log in and perform Unix functions in Bash or Bourne shell making this a very powerful terminal emulator, capable of manipulating mainframes and "hacking" into the heart of the internet at low and high levels.
ProTERM was rich in features such as an extensive "scrollback" buffer limited only by the computer's memory, an optional mouse-based interface in the Apple II version (standard on the Mac), an easy-to-use and very powerful text editor, auto learning macros, and a variety of terminal emulations such as VT100, ANSI and the powerful but proprietary "ProTERM Special Emulation" (also referred to as: PSE or PTSE) which used Apple's semi graphical MouseText character set. Supported file transfer protocols ranged from Kermit and Xmodem to Ymodem (Batch, 4K and G) and Zmodem (Batch Selections).
One feature of ProTERM Mac was the C-like scripting or macro language embedded inside ProTERM, allowing users to code and run ProTERM automatically. ProTERM could also be programmed to log in and execute command-line interface commands on the host machine, effectively controlling it remotely.
The latest published versions of ProTERM were v3.1 for the Apple II and v1.5 for the Macintosh. On January 3, 2009, the most recent Apple II version, 3.1, was relicensed as freeware and is now available for download.
References
Apple II software
Classic Mac OS software
Terminal emulators
Freeware
|
919353
|
https://en.wikipedia.org/wiki/Chongqing%20University%20of%20Posts%20and%20Telecommunications
|
Chongqing University of Posts and Telecommunications
|
Chongqing University of Posts and Telecommunications (; abbreviation: CQUPT) is a public university in China's fourth largest municipality: Chongqing. It focuses on the research and education in the field of information and communications and enjoys nationwide reputation in the study of postal communications, telecommunications and information technology, especially for its research and commercialization in 3G mobile technologies, optical sciences and related digital research. It is one of the four universities of Posts and Telecommunications in China and the only one of its kind in the Southwest China. It enjoys a good reputation in the ICT industry in China due to its high-quality education and research and the large number of alumni working in the ICT industry. Due to its achievements and contributions in the field of information and communications technology, especially in the development of China's own digital communications systems, CQUPT is considered as the cradle of China's digital communications.
History
CQUPT was founded in 1950 along with the foundation of the People's Republic of China and the communist takeover of Chongqing. It was initially founded in the name of Chongqing Institute of Posts and Telecommunications. In 1965, it was entitled to have postgraduate programs as one of the first 10 colleges that had the right to have such programs in the then Sichuan Province (Chongqing separated from Sichuan province as a Municipality in 1997).
In 2000, under the university system reform in China, the university became co-governed and co-financed by the Chinese Central Government with the Chongqing government. In 2006, CQUPT contracted with MIIT (Ministry of Industry and Information Technology of China) to become one of the universities supported by the central government ministry and the municipality government.
Schools
CQUPT has 15 schools and institutes with the Chongqing International Institute of Semiconductors established in 2010.
School of Communications and Information Engineering
Communication Engineering
Telecommunication Engineering
Information Engineering
Radio and Television Engineering
School of Computer Science and Technology
Computer Science and Technology
Network Engineering
Information Security
AI tech
Geographic Information System
School of Automation
Automation
Measurement and Control Technology and Instrumentation
Electrical Engineering and Automation
Mechanical design and Automation
Internet of Things Engineering
School of Optoelectronic Engineering
School of Bioinformatics
School of Mathematics and Physics
School of Software Engineering (CQUPT-HP Software School)
School of Economics and Management
School of Arts and Communication
CQUPT Law School
CQUPT International School
School of Foreign Languages
School of Continuing Education
School of Physical Education
Chongqing International Institute of Semiconductor
A list of schools at CQUPT and the academic programs each offer can be found at the webpage 'School Navigation' from CQUPT's website.
Research
Overview
CQUPT is the origin of the China's digital communications systems. In the very recent years, over 600 scientific projects in the ICT field have been done in the university and 80 of them were granted the "Scientific Research Achievement Awards" by the government. CQUPT is the only Chinese university participating in the development of China's own 3G standard: TD-SCDMA.
The world's first TD-SCDMA chip and mobile phone were developed at CQUPT. The university played a key role in the establishment of China's first national "EPA Communication Standard for Industrial Measurement and Control System", which was recognized by the IEC as international standard in the field of industrial automation. The university's spin-off company Chongqing CYIT Communications Technologies Company (CYIT) is among the first companies doing research on TD-SCDMA and TD-LTE in China and is already a frontrunner in the field nowadays.
The university's strength also lies in areas such as computer science, automatic control technology, microtechnologies, and others, as one of the first academic institutions doing research in these fields in China.
Research at CQUPT is done in about 30 research platforms. Each of the research platforms may contain several laboratories or research groups. Research at CQUPT is closely linked to the industry. In 2010, the Chongqing International Institute of Semiconductor, which is in and hosted by CQUPT, was founded with the participating of nearly 50 partners in industry from around the world, including Qualcomm in USA, Eplida in Japan, the International Association of Semiconductor Equipment and Materials European Microelectronics Center in Taiwan among others. The research at CQUPT is widely done in cooperation with other academic or industrial partners in the form of joint research centers or laboratory.
Academic institutions which have founded joint research centers with CQUPT include the Chinese Science Academy (CSA), the Nanyang Technological University (NTU) in Singapore, Essex University in UK, Inha University in South Korea, etc. The university's industrial partners, which have founded joint research centers or laboratories include Oracle, Cisco, Lenovo Mobile, Maipu Communications, and others.
The university boasts 11 Key Disciplines of ministry and provincial level, and 16 key laboratories, engineering research centres and humanities and social science bases.
Main research bases
Nation Defense Mobilization center of 3G dual-use terminal equipment" (military-civilian alliance), under National Development and Reform Commission.
Mobile Communication Nation together with Local Engineering Research Center, under National Development and Reform Commission.
Mobile Communication National High-tech Base Innovation Platform, under National Development and Reform Commission.
Industrial Automation Tech National High-tech Base Innovation Platform, under National Development and Reform Commission.
National Accessible Information Engineering Research Center, under MIIT.
China National Information Security Application Base, under Chinese Academy of Social Sciences.
Engineering research center of mobile communication, under the Ministry of Education
Key laboratory of networked control and intelligent instrument and meter, under the Ministry of Education
Key laboratory of mobile communication, under the Ministry of Information Industry and Chongqing Municipal Government
Key laboratory of computer network and communication technology, under the Ministry of Information Industry and Chongqing Municipal Government
Key laboratory of fiber-optic communication technology, under the Ministry of Information Industry and Chongqing Municipal Government
Key laboratory of postal automation technology, under the Ministry of Information Industry
"R&D center of Chongqing industrial communication technology", co-founded with Shenyang Institute of Automation, Chinese Academy of Sciences
"Silian-CQUPT joint R&D center", co-founded with China Silian Group
Key laboratory of signal and information processing, under Chongqing Municipal Government
Laboratory of industrial automation technology, under Chongqing Municipal Government
Chongqing Laboratory of Internet and Information Security, under Chongqing Municipal Government
Engineering research center of mobile communication, under Chongqing Municipal Government
Key laboratory of micro-electronic engineering, under Chongqing Municipal Government
Engineering technology research center of intelligent instrument and control device, under Chongqing Municipal Government
Key laboratory of network control technology and intelligent instrument and meter, under Chongqing Municipal Government
Key laboratory of e-commerce and modern logistics, under Chongqing Municipal Government
Engineering research center of automotive electronics and embedded system in universities, under Chongqing Municipal Government
R&D center of industrial communication, under Chongqing Municipal Government
'Research Institutions' on CQUPT's website offers a complete list of research platforms and research institutions at CQUPT.
Students and alumni
Over the 60 years since the establishment of university in 1950, CQUPT has educated over 70,000 students in the field of Information and Communication, many of whom are in the high positions of China's telecommunications companies. The university is deemed as the cradle of talents of ICT industry in China. It boasts its high employment rate among Chinese universities.
Even though the university is featured with excellence in the area of Information and Communications, it is striving to offer a wide range of other subjects including science, engineering, economics, management, arts and education, most of which are related to applied science and engineering. The university offers 45 undergraduate programs, 37 postgraduate programs and Master of Engineering programs; it was also authorized to confer doctor's degrees in the disciplines of Information and Communication Engineering, Computer Science and Technology, Electronic Science and Technology, Control Science and Engineering, Management and Engineering.
CQUPT has about 20,000 students, including more than 3,000 postgraduates.
Partnerships
CQUPT has established good cooperative relations and links with over 30 prestigious universities in USA, Russia, UK, Italy, Canada, Korea, Singapore and so forth.
Some examples of joint research centers co-founded with other academic institutions out of China include the Joint Research Center of 4G Mobile Communications co-founded with Nanyang Technological University (NTU) in Singapore, the Sino-Korean Institute of Spatial Information Systems founded with Inha University and Seowon University in South Korea, the Sino-Europe Joint Laboratory for Intelligent Systems and Robotics with the Essex University and Open University in UK.
Research at CQUPT is also widely collaborated with famous companies in the industry. Many companies found joint laboratories or centers with CQUPT such as Oracle (CQUPT-Oracle Joint Laboratory of Database Technology), Lenovo Mobile (CQUPT-Lenovo Moile Internet Application Research Center), Cisco (CQUPT-Cisco Joint R&D Center of Green Technology). In July, 2010, the School of Computer Science and Technology signed a collaboration contract with Cornell University and founded the CU-CQUPT Joint Lab of Intelligent Computing. Other education or research partners include IBM, Ericsson, Lenovo Mobile, Nokia, China Silian Group, Maipu Communications, Foxconn Technology, ProMOS Technologies and many others. To deepen the relationship with local industry, the university also establishes a good relationship with the local high-tech industry parks like Chongqing Liangjiang New Area, Chongqing Xiyong Microelectronics Industrial Park and Chayuan Industrial Park.
Board
In 2010, the university founded the university board. The board of the university include China Telecom, China Mobile, China Unicom, China Post, Huawei, ZTE, DaTang, China Putian, Lenovo and other industry partners.
References
External links
CQUPT website (in English)
CQUPT website (in Chinese)
Introduction of CQUPT (in Chinese)
Research platforms in CQUPT (in Chinese)
Virtual Campus
CQUPT BBS
Universities and colleges in Chongqing
Educational institutions established in 1950
Telecommunications organizations
Telecommunications in China
1950 establishments in China
Telecommunication education
Nan'an District
|
23321246
|
https://en.wikipedia.org/wiki/World%20Robot%20Olympiad
|
World Robot Olympiad
|
The World Robot Olympiad (WRO) is a global robotics competition for young people. The World Robot Olympiad competition uses Lego Mindstorms manufactured by LEGO Education. First held in 2004 in Singapore, it now attracts more than 26,000 teams from more than 65 countries.
The competition consists of 4 different categories, Regular, College, Open and Soccer and for the Regular and Open categories, it consists of three different age groups: Elementary, Junior High and Senior High. Participants below the age of 13 are considered as Elementary, participants from ages 13 until 16 years old are considered Junior High and participants between 17 and 19 are considered Senior High. Participants can also compete outside their age group, but they must be younger than the specified age range and must partner up with someone in that age range. For example, a 12-year-old participant can join the Junior High sub-category only if teamed up with someone between 14 and 16.
History
WRO was formally established in 2003, with the first international WRO final being organized in 2004. Organizations from China, Japan, Singapore and Korea are considered the founding countries. In 2004 teams from China, Chinese Taipei, Hong Kong, India, Indonesia, Japan, Korea, Malaysia, Philippines, Russia, Singapore and Thailand took part in the first international final, held in Singapore.
In 2003 the four founding countries established the international WRO Committee (now known as the WRO Advisory Council), which decided to establish a new and permanent robotics organisation, based on the idea that students from all over the world should have the opportunity to meet with other students to fulfil the new mission statement:
"To bring together young people all over the world to develop their creativity, design & problem solving skills through challenging & educational robot competitions and activities"
The WRO Committee decided on the new name World Robot Olympiad, and new WRO logos were developed.
Finally the WRO Statutes and a set of General Rules were worked out to ensure a sound and safe future for WRO. One of the major decisions, which appears in the Statutes, was that the international WRO event should be hosted by a new country each year and the WRO Committee should elect a chairman.
In 2017, the host country of WRO was Costa Rica. This was the first time the competition was held outside the Asia Region and the first time it came to the Americas.
WRO Categories
At WRO, challenging competitions are offered for everyone in the age from 6 – 25. WRO have four competition categories, with their own characteristics and challenges:
Regular Category
Open Category
WRO Football
Advanced Robotics Challenge
Each season the challenges and theme for the Regular and Open Category are developed with the country that hosts the International Final. The WRO Football rules and the Advanced Robotics Challenge game are designed together with experts in the robotic sciences community.
Overview of all WRO Categories
Regular Category
Teams must create a robot which can complete a specified mission determined by the organiser and usually based on the Open Category theme. Before the competition begins, the robot must be fully dismantled: for example, the batteries must be taken out of the brick or the tyres must be taken out from the wheels. It must be built in a specified time (150 minutes) before the first qualification round begins. If a team finishes building their robot before the 150 minutes finish, the team can practice on the competition fields. Each robot is restricted to be before the round begins, and may consist of only LEGO certified parts, with specified motors and sensors depending on each competition. It must finish the mission autonomously, within a maximum time of two minutes. Teams are judged on their scores. If two teams' scores are equal, they are judged by their time to the nearest millisecond.
Regular Category characteristics
Three age groups: Elementary (up to 13y), Junior (13-15y) and Senior (16-19y.)
Hardware: The controller, motors and sensors used to assemble robots must be from LEGO MINDSTORMS sets (NXT or EV3). The HiTechnic Color Sensor is the only third-party element that can be added to this configuration. Only LEGO branded elements may be used to construct the remaining parts of the robot.
Software: The use of programming software depends on the age group:
For Elementary and Junior age group only LEGO RoboLab, NXT and EV3 software are allowed.
For Senior age group, any software and any firmware can be run on NXT / EV3 controllers.
Maximum robot size: 25 cm x 25 cm x 25 cm.
Surprise Rule: A surprise rule will be announced when the competition starts, to test the team's ability to adapt their hardware or programming. (Note: some member countries have a slightly different approach to the surprise rule.)
Assembly: The teams bring their robot completely disassembled. In the first part of the competition they will have 150 minutes to assemble their robots from loose parts without instructions.
Team: A team consists of 1 coach and 2 or 3 team members.
Open Category
The Open Category is a project based competition. Students create their own intelligent robotics solution relating to the current theme of the season. Teams will present their project and their robot model to a group of judges on the competition day.
Open Category characteristics
Three age groups: Elementary (up to 13y), Junior (13-15y) and Senior (16-19y.)
Hardware: The robot model must be controlled by a LEGO MINDSTORMS NXT or EV3 brick, but there no further restriction on the balance between LEGO and other elements.
Software: Free choice of programming language / software.
Maximum size: Teams present the idea in a 2m x 2m x 2m booth on the competition day.
Team: A team consists of 1 coach and 2 or 3 team members.
WRO Football
With WRO Football is introduced a fun and exciting game with teams of two autonomous robots playing football (soccer). Every year little changes are introduced for the game to motivate the students to keep on developing their robots.
WRO Football characteristics
One age group: 10–19 years old.
Hardware: Teams need two robots to participate in WRO Football. The controller, motors and sensors used to assemble robots must be from LEGO MINDSTORMS sets (NXT or EV3). Only LEGO branded elements may be used to construct the remaining parts of the robot. In addition, teams will need the HiTechnic infrared ball and can use the HiTechnic infrared and compass sensors.
Software: Only LEGO RoboLab, NXT and EV3 software are allowed.
Maximum robot size: Each robot must fit inside an upright 22 cm diameter and 22 cm high cylinder and must not weigh more than 1 kg.
Assembly: The teams bring their robot completely disassembled. In the first part of the competition they will have 120 minutes to assemble their robots from loose parts without instructions.
Team: A team consists of 1 coach and 2 or 3 team members.
Advanced Robot Challenge (University/College)
The Advanced Robotics Challenge (ARC) is the newest category. The games are designed to test older and more experienced student's engineering and programming skills to the limit.
Teams compete on a set challenge. Robots may be pre-built and may use certain TETRIX and MATRIX elements. Teams may use either one MyRIO or KNR controller, or two EV3/NXT controllers; there are no restrictions on choice and number of sensors, motors and servos. The size of the robot before it begins must be within . The maximum time differs depending on each competition.
In 2015 and 2016 it ran a Bowling game and in the 2017 season it was introduced the Tetrastack challenge.
Advanced Robotics Challenge characteristics
One age group: 17–25 years old.
Hardware: Robots must be built using MATRIX and TETRIX building systems only. There are no restrictions about the use and brand of sensors, batteries or electrical motors and servos.
Controllers: Only National Instruments myRIO or KNR (myRIO based). Note: 2017 is the last year that LEGO EV3 controllers can be used.
Software: Control software must be written in LabVIEW from National Instruments or any text-based language like C, C++, C#, RobotC, Java or Python.
Maximum robot size: 45 cm x 45 cm x 45 cm.
Team: A team consists of 1 coach and 2 or 3 team members.
Changes to the Gameplay
As the missions of the Regular, WRO Football and College Category get tougher and more teams in the Open Category are willing to present more creative-looking robots, organisers have to make changes to the list of eligible sensors, motors and bricks to be used in the competition. Initially only RCX bricks, motors and sensors were allowed. In the 2007 competition NXT bricks, motors and sensors were allowed as well. In 2011 the NXT colour sensor was added; in 2012, the HiTechnic colour sensor. In 2013 an EV3 robot was exhibited that used all four motors. In 2014, however, EV3 bricks, motors and sensors were allowed, but the number of motor ports was limited to three, and the EV3 Gyro sensor was not allowed. The 2015 competition allowed four motor ports and the gyro sensor, but not RCX bricks, motors, or sensors.
There are also a few changes to the number of categories. The earlier versions of this competition, before 2006, consists of only Regular and Open and that further sub-divides to only two age groups, Primary and High School.
Age Group Definitions
Compete with peers
WRO have the ambition of being relevant to students of different ages. That is why it is offer competitions on platforms that provide fun and challenging experiences.
It is also why it have decided two of the categories into three age groups. In the Regular Category, each age group has a different mission. In the Open Category, the challenge is the same for all participants, but they are judged within their age group.
Please note:
The mentioned ages reflect the age of the participant in the year of the competition, not at the competition day. For participation in the international WRO final it is strictly enforced that students cannot, at any time in the year of the competition, be older than specified in the age group definitions. Example: A participant that is still 12 years old at the time of the international WRO final in November, but turns 13 years old in December the same year cannot participate in Elementary Category.
Age groups Regular Category
Age groups Open Category
Age group WRO Football
Age group Advanced Robotics Challenge (ARC)
Table of Eligibility (TOE)
Qualification for the international final
Only teams that participated in a national competition in the warudo one of our member countries can qualify for the international final. The WRO Table of Eligibility (TOE) defines how many teams a WRO National Organizer can register for the international final.
The number of teams a National Organizer may send to the international final depends on the number of teams in the national competition.
Each competition category has its own TOE.
A country has to have minimum 5 teams in a competition category to register teams for the international WRO final for that category.
A team may participate in only one competition; Regular Category, Open Category, WRO Football or Advanced Robotics Challenge.
Any student may participate in one team only.
The numbers in the tables are maximum per age group and category and cannot be transferred from one age group or category to another. National Organizers may register fewer teams than allowed, but never more.
In Regular category, if a country does not compete in a certain age group, it is not allowed to swap teams around. (For example: If you have 5–99 teams and you don't compete in Senior age group, it is not allowed to bring 1 Elementary and 2 Junior teams.)
Qualification Regular Category
Qualification Open Category
Qualification Football Category
Qualification ARC
Hosts
Countries participating
Previous host countries are italicised while future host countries are bolded. Countries which are both previous and future hosts will have an asterisks (*).
Winners
2018
Regular Category
Open Category
Football Category
Advanced Robotics Challenge (ARC) Category
Previous Years
Sponsors
Lego Education
Juniper Networks
References
External links
World Robot Olympiad site
Robotics competitions
Recurring events established in 2004
|
5228814
|
https://en.wikipedia.org/wiki/Hudson%20Houck
|
Hudson Houck
|
Hudson Houck (born January 7, 1943) is an American football coach and college player who was an offensive line coach for a six teams of the National Football League (NFL) over a 40-year coaching career. Houck retired on January 10, 2012.
Playing career and coaching beginnings
Houck was a center for the Trojans of Southern California from 1962 to 1964. He won a national championship as a member of the 1962 team.
He began his coaching career as an assistant coach for Crescenta Valley High School in California. Following two years in the United States Army, Houck resumed his role at Crescenta Valley.
In 1970 Houck coached the freshmen team at Southern California, and after two years he became the offensive line coach at Stanford. There he coached the first Stanford 2-time All-Pac-8 offensive guard and Hall of Famer, Alex Karakozoff and sent several players to the NFL including Gary Anderson, Bill Reid and tutoring eventual All-American and first round NFL draft pick Gordon King.
Houck returned to his alma mater in 1976, coaching the offensive line at Southern California. During this time, he helped send numerous Trojans to the National Football League including Marvin Powell, Pat Howell, Brad Budde, Anthony Muñoz, Keith Van Horne, Chris Foote, Roy Foster, Bruce Matthews, Don Mosebar and Tony Slaton, among others. This group helped lead the way for Heisman Trophy-winning running backs Charles White and Marcus Allen, in addition to another USC great, Ricky Bell, an NFL first-round draft choice in 1977.
Pro coaching career
Houck's first pro coaching experience came with the Los Angeles Rams, where he coached the offensive line from 1983 to 1991.
Houck spent one season as offensive line coach for the Seattle Seahawks in 1992. Seahawks running back Chris Warren logged the first 1,000-yard rushing season of his career with Houck tutoring his blockers.
Houck spent the next nine years coaching the offensive line for the Dallas Cowboys. At times during Houck's tenure the Cowboys' line was one of the most dominant in the history of the game. The 203 sacks they allowed in nine years under Houck were the fewest of any NFL team in that span. Six offensive linemen earned 22 trips to the Pro Bowl under Houck, including Larry Allen (7), Nate Newton (5), Erik Williams (4), Ray Donaldson (2), Mark Stepnoski (2) and Mark Tuinei (2). Hall of Fame running back Emmitt Smith earned a pair of rushing titles during Houck's tenure, and rushed for over 1,000 yards every season. He was also the assistant head coach from 1994 to 1997.
After the firing of Chan Gailey in 2000, he was considered as one of the candidates to take over the head coaching duties of the Dallas Cowboys, which eventually went to Dave Campo.
With the San Diego Chargers from 2002 to 2004, Houck transformed one of the league's worst offensive lines to one of the best. Running back LaDainian Tomlinson rushed for more than 1,300 yards in each of Houck's three seasons with the team. With five new starters on the line in 2004, the Chargers ranked tenth in total offense and sixth in rushing. The Chargers allowed fewer than 25 sacks per season under Houck.
Houck was hired to work for the Miami Dolphins head coach Nick Saban. During his first year with the Dolphins in 2005, Houck's offensive line ranked fourth in the NFL in fewest sacks allowed. In 2007, Houck was reunited with then Dolphins head coach Cam Cameron. Houck and Cameron worked together in San Diego when Cameron was offensive coordinator for the Chargers.
After the Dolphins' 1-15 2007 season, Houck was fired along with most of the Dolphins' coaching staff by incoming Vice President of Football Operations Bill Parcells. Jerry Jones re-hired Houck when Parcells hired Cowboys line coach Tony Sparano to serve as the Dolphins' head coach.
References
1943 births
Living people
Dallas Cowboys coaches
Los Angeles Rams coaches
Miami Dolphins coaches
San Diego Chargers coaches
Seattle Seahawks coaches
Stanford Cardinal football coaches
USC Trojans football coaches
USC Trojans football players
High school football coaches in California
Players of American football from Los Angeles
Coaches of American football from California
Sports coaches from Los Angeles
|
10035905
|
https://en.wikipedia.org/wiki/Integrated%20computational%20materials%20engineering
|
Integrated computational materials engineering
|
Integrated Computational Materials Engineering (ICME) is an approach to design products, the materials that comprise them, and their associated materials processing methods by linking materials models at multiple length scales. Key words are "Integrated", involving integrating models at multiple length scales, and "Engineering", signifying industrial utility. The focus is on the materials, i.e. understanding how processes produce material structures, how those structures give rise to material properties, and how to select materials for a given application. The key links are process-structures-properties-performance. The National Academies report describes the need for using multiscale materials modeling to capture the process-structures-properties-performance of a material.
Standardization in ICME
A fundamental requirement to meet the ambitious ICME objective of designing materials for specific products resp. components is an integrative and interdisciplinary computational description of the history of the component starting from the sound initial condition of a homogeneous, isotropic and stress free melt resp. gas phase and continuing via subsequent processing steps and eventually ending in the description of failure onset under operational load.
Integrated Computational Materials Engineering is an approach to design products, the materials that comprise them, and their associated materials processing methods by linking materials models at multiple length scales. ICME thus naturally requires the combination of a variety of models and software tools. It is thus a common objective to build up a scientific network of stakeholders concentrating on boosting ICME into industrial application by defining a common communication standard for ICME relevant tools.
Standardization of information exchange
Efforts to generate a common language by standardizing and generalizing data formats for the exchange of simulation results represent a major mandatory step towards successful future applications of ICME. A future, structural framework for ICME comprising a variety of academic and/or commercial simulation tools operating on different scales and being modular interconnected by a common language in form of standardized data exchange will allow integrating different disciplines along the production chain, which by now have only scarcely interacted. This will substantially improve the understanding of individual processes by integrating the component history originating from preceding steps as the initial condition for the actual process. Eventually this will lead to optimized process and production scenarios and will allow effective tailoring of specific materials and component properties.
The ICMEg project and its mission
The ICMEg project aims to build up a scientific network of stakeholders concentrating on boosting ICME into industrial application by defining a common communication standard for ICME relevant tools. Eventually this will allow stakeholders from electronic, atomistic, mesoscopic and continuum communities to benefit from sharing knowledge and best practice and thus to promote a deeper understanding between the different communities of materials scientists, IT engineers and industrial users.
ICMEg will create an international network of simulation providers and users. It will promote a deeper understanding between the different communities (academia and industry) each of them by now using very different tools/methods and data formats. The harmonization and standardization of information exchange along the life-cycle of a component and across the different scales (electronic, atomistic, mesoscopic, continuum) are the key activity of ICMEg.
The mission of ICMEg is
to establish and to maintain a network of contacts to simulation software providers, governmental and international standardization authorities, ICME users, associations in the area of materials and processing, and academia
to define and communicate an ICME language in form of an open and standardized communication protocol
to stimulate knowledge sharing in the field of multiscale materials design
to identify missing tools, models and functionalities and propose a roadmap for their development
to discuss and to decide about future amendments to the initial standard
The activities of ICMEg include
Organization of International Workshops on Software Solutions for Integrated Computational Materials Engineering
Conducting market study and survey on available simulation software for ICME
Create and maintain forum for knowledge sharing in ICME
The ICMEg project ended in October 2016. Its major outcomes are
a Handbook of Software Solutions for ICME
the identification of HDF5 as a suitable communication file standard for microstructure information exchange in ICME settings
the specification of a metadata description for microstructures
a network of stakeholders in the area of ICME
Most of the activities being launched in the ICMEg project are continued by the European Materials Modelling Council and in the MarketPlace project
Multiscale modeling in material processing
Multiscale modeling aims to evaluate material properties or behavior on one level using information or models from different levels and properties of elementary processes.
Usually, the following levels, addressing a phenomenon over a specific window of length and time, are recognized:
Structural scale: Finite element, finite volume and finite difference partial differential equation are solvers used to simulate structural responses such as solid mechanics and transport phenomena at large (meters) scales.
process modeling/simulations: extrusion, rolling, sheet forming, stamping, casting, welding, etc.
product modeling/simulations: performance, impact, fatigue, corrosion, etc.
Macroscale: constitutive (rheology) equations are used at the continuum level in solid mechanics and transport phenomena at millimeter scales.
Mesoscale: continuum level formulations are used with discrete quantities at multiple micrometer scales. "Meso" is an ambiguous term that means "intermediate" so it has been used as representing different intermediate scales. In this context, it can represent modeling from crystal plasticity for metals, Eshelby solutions for any materials, homogenization methods, and unit cell methods.
Microscale: modeling techniques that represent the micrometer scale such as dislocation dynamics codes for metals and phase field models for multiphase materials. Phase field models of phase transitions and microstructure formation and evolution on nanometer to millimeter scales.
Nanoscale: semi-empirical atomistic methods are used such as Lennard-Jones, Brenner potentials, embedded atom method (EAM) potentials, and modified embedded atom potentials (MEAM) in molecular dynamics (MD), molecular statics (MS), Monte Carlo (MC), and kinetic Monte Carlo (KMC) formulations.
Electronic scale: Schroedinger equations are used in a computational framework as density functional theory (DFT) models of electron orbitals and bonding on angstrom to nanometer scales.
There are some software codes that operate on different length scales such as:
CALPHAD computational thermodynamics for prediction of equilibrium phase diagrams and even non-equilibrium phases.
Phase field codes for simulation of microstructure evolution
Databases of processing parameters, microstructure features, and properties from which one can draw correlations at various length scales
GeoDict - The Digital Material Laboratory by Math2Market
VPS-MICRO is a multiscale probabilistic fracture mechanics software.
SwiftComp is a multiscale constitutive modeling software based on mechanics of structure genome.
Digimat is a multiscale material modeling platform
A comprehensive compilation of software tools with relevance for ICME is documented in the Handbook of Software Solutions for ICME
Examples of Model integration
Small scale models calculate material properties, or relationships between properties and parameters, e.g. yield strength vs. temperature, for use in continuum models
CALPHAD computational thermodynamics software predicts free energy as a function of composition; a phase field model then uses this to predict structure formation and development, which one may then correlate with properties.
An essential ingredient to model microstructure evolution by phase field models and other microstructre evolution codes are the initial and boundary conditions. While boundary conditions may be taken e.g. from the simulation of the actual process, the initial conditions (i.e. the initial microstructure entering into the actual process step) involve the entire integrated process history starting from the homogeneous, isotropic and stress free melt. Thus - for a successful ICME - an efficient exchange of information along the entire process chain and across all relevant length scales is mandatory. The models to be combined for this purpose comprise both academic and/or commercial modelling tools and simulation software packages. To streamline the information flow within this heterogeneous variety of modelling tools, the concept of a modular, standardized simulation platform has recently been proposed. A first realisation of this concept is the AixViPMaP® - the Aachen Virtual Platform for Materials Processing.
Process models calculate spatial distribution of structure features, e.g. fiber density and orientation in a composite material; small-scale models then calculate relationships between structure and properties, for use in a continuum models of overall part or system behavior
Large scale models explicitly fully couple with small scale models, e.g. a fracture simulation might integrate a continuum solid mechanics model of macroscopic deformation with an FD model of atomic motions at the crack tip
Suites of models (large-scale, small-scale, atomic-scale, process-structure, structure-properties, etc.) can be hierarchically integrated into a systems design framework to enable the computational design of entirely new materials. A commercial leader in the use of ICME in computational materials design is QuesTek Innovations LLC, a small business in Evanston, IL co-founded by Prof. Greg Olson of Northwestern University. QuesTek's high-performance Ferrium® steels were designed and developed using ICME methodologies.
The Mississippi State University Internal State Variable (ISV) plasticity-damage model (DMG) developed by a team led by Prof. Mark F. Horstemeyer (Founder of Predictive Design Technologies) has been used to optimize the design of a Cadillac control arm, the Corvette engine cradle, and a powder metal steel engine bearing cap.
ESI Group through its ProCast and SYSWeld are commercial finite element solutions used in production environments by major manufacturers in aerospace, automotive and government organizations to simulate local material phase changes of metals prior to manufacturing. PAMFORM is utilized for tracking material changes during composite forming manufacturing simulation.
Education
Katsuyo Thorton announced at the 2010 MS&T ICME Technical Committee meeting that NSF would be funding a "Summer School" on ICME at the University of Michigan starting in 2011. Northwestern began offering a Masters of Science Certificate in ICME in the fall of 2011. The first Integrated Computational Materials Engineering (ICME) course based upon Horstemeyer 2012 was delivered at Mississippi State University (MSU) in 2012 as a graduate course with distance learning students included [c.f., Sukhija et al., 2013]. It was later was taught in 2013 and 2014 at MSU also with distance learning students. In 2015, the ICME Course was taught by Dr. Mark Horstemeyer (MSU) and Dr. William (Bill) Shelton (Louisiana State University, LSU) with students from each institution via distance learning. The goal of the methodology embraced in this course was to provide students with the basic skills to take advantage of the computational tools and experimental data provided by EVOCD in conducting simulations and bridging procedures for quantifying the structure-property relationships of materials at multiple length scales. On successful completion of the assigned projects, students published their multiscale modeling learning outcomes on the ICME Wiki, facilitating easy assessment of student achievements and embracing qualities set by the ABET engineering accreditation board.
See also
Computational materials science
Materials informatics
ICME cyberinfrastructure
Cyberinfrastructure
References
JOM November 2006 issue focused on ICME
Committee on Integrated Computational Materials Engineering, National Research Council, Integrated Computational Materials Engineering: A Transformational Discipline for Improved Competitiveness and National Security, National Academies Press, 2008. , NAP Link
G. Olson, Designing a New Material Word, Science, Vol. 288, May 12, 2000
Horstemeyer 2009: Horstemeyer M.F., "Multiscale Modeling: A Review," Practical Aspects of Computational Chemistry, ed. J. Leszczynski and M.K. Shukla, Springer Science+Business Media, pp. 87-135, 2009
External links
ICME section of Materials Technology @ TMS
[Advances in ICME Implementation: Concepts and Practices” in the May 2017 issue (vol. 69, no. 5) of JOM https://link.springer.com/journal/11837/69/5]
Cyberinfrastructure for ICME at Mississippi State University
GeoDict The Digital Material Laboratory
Materials science
|
148113
|
https://en.wikipedia.org/wiki/Digital%20art
|
Digital art
|
Digital art is an artistic work or practice that uses digital technology as part of the creative or presentation process. Since the 1960s, various names have been used to describe the process, including computer art and multimedia art. Digital art is itself placed under the larger umbrella term new media art.
After some initial resistance, the impact of digital technology has transformed activities such as painting, literature, drawing, sculpture and music/sound art, while new forms, such as net art, digital installation art, and virtual reality, have become recognized artistic practices. More generally the term digital artist is used to describe an artist who makes use of digital technologies in the production of art. In an expanded sense, "digital art" is contemporary art that uses the methods of mass production or digital media.
The techniques of digital art are used extensively by the mainstream media in advertisements, and by film-makers to produce visual effects. Desktop publishing has had a huge impact on the publishing world, although that is more related to graphic design. Both digital and traditional artists use many sources of electronic information and programs to create their work. Given the parallels between visual and musical arts, it is possible that general acceptance of the value of digital visual art will progress in much the same way as the increased acceptance of electronically produced music over the last three decades.
Digital art can be purely computer-generated (such as fractals and algorithmic art) or taken from other sources, such as a scanned photograph or an image drawn using vector graphics software using a mouse or graphics tablet. Though technically the term may be applied to art done using other media or processes and merely scanned in (from scanography ), it is usually reserved for art that has been non-trivially modified by a computing process (such as a computer program, microcontroller or any electronic system capable of interpreting an input to create an output); digitized text data and raw audio and video recordings are not usually considered digital art in themselves, but can be part of the larger project of computer art and information art. Artworks are considered digital painting when created in a similar fashion to non-digital paintings but using software on a computer platform and digitally outputting the resulting image as painted on canvas.
Andy Warhol created digital art using a Commodore Amiga where the computer was publicly introduced at the Lincoln Center, New York in July 1985. An image of Debbie Harry was captured in monochrome from a video camera and digitized into a graphics program called ProPaint. Warhol manipulated the image adding colour by using flood fills.
Amidst varied opinions on the pros and cons of digital technology on the arts, there seems to be a strong consensus within the digital art community that it has created a "vast expansion of the creative sphere", i.e., that it has greatly broadened the creative opportunities available to professional and non-professional artists alike.
Whilst 2D and 3D digital art is beneficial as it allows preservation of history that would otherwise have been destroyed by events like natural disasters and war, there is the issue of who should own these 3D scans - i.e. who should own the digital copyrights.
Computer-generated visual media
Digital visual art consists of either 2D visual information displayed on an electronic visual display or information mathematically translated into 3D information, viewed through perspective projection on an electronic visual display. The simplest is 2D computer graphics which reflect how you might draw using a pencil and a piece of paper. In this case, however, the image is on the computer screen and the instrument you draw with might be a tablet stylus or a mouse. What is generated on your screen might appear to be drawn with a pencil, pen or paintbrush. The second kind is 3D computer graphics, where the screen becomes a window into a virtual environment, where you arrange objects to be "photographed" by the computer. Typically a 2D computer graphics use raster graphics as their primary means of source data representations, whereas 3D computer graphics use vector graphics in the creation of immersive virtual reality installations. A possible third paradigm is to generate art in 2D or 3D entirely through the execution of algorithms coded into computer programs. This can be considered the native art form of the computer, and an introduction to the history of which is available in an interview with computer art pioneer Frieder Nake. Fractal art, Datamoshing, algorithmic art and real-time generative art are examples.
Computer generated 3D still imagery
3D graphics are created via the process of designing imagery from geometric shapes, polygons or NURBS curves to create three-dimensional objects and scenes for use in various media such as film, television, print, rapid prototyping, games/simulations and special visual effects.
There are many software programs for doing this. The technology can enable collaboration, lending itself to sharing and augmenting by a creative effort similar to the open source movement, and the creative commons in which users can collaborate in a project to create art.
Pop surrealist artist Ray Caesar works in Maya (a 3D modeling software used for digital animation), using it to create his figures as well as the virtual realms in which they exist.
Computer generated animated imagery
Computer-generated animations are animations created with a computer, from digital models created by the 3D artists or procedurally generated. The term is usually applied to works created entirely with a computer. Movies make heavy use of computer-generated graphics; they are called computer-generated imagery (CGI) in the film industry. In the 1990s, and early 2000s CGI advanced enough so that for the first time it was possible to create realistic 3D computer animation, although films had been using extensive computer images since the mid-70s. A number of modern films have been noted for their heavy use of photo realistic CGI.
Digital installation art
Digital installation art constitutes a broad field of activity and incorporates many forms. Some resemble video installations, particularly large scale works involving projections and live video capture. By using projection techniques that enhance an audience's impression of sensory envelopment, many digital installations attempt to create immersive environments. Others go even further and attempt to facilitate a complete immersion in virtual realms. This type of installation is generally site-specific, scalable, and without fixed dimensionality, meaning it can be reconfigured to accommodate different presentation spaces.
Noah Wardrip-Fruin's "Screen" (2003) is an example of interactive digital installation art which makes use of a Cave Automatic Virtual Environment to create an interactive experience. Scott Snibbe's "Boundary Functions" is an example of augmented reality digital installation art, which responds to people who enter the installation by drawing lines between people indicating their personal space.
Digital Art and Blockchain
Blockchain, and more specifically NFTs, have been associated with Digital Art since the NFTs craze of 2020 and 2021. While the technology received many critics and has many flaws related to plagiarism and fraud (due to its almost completely unregulated nature), auction houses like Sotheby's, Christie's and various museums and galleries in the world started collaborations and partnerships with digital artists, selling NFTs associated with digital artworks (via NFT platforms) and showcasing those artworks (associated to the respective NFTs) both in virtual galleries and real life screens, monitors and TVs.
Art theorists and historians
Notable art theorists and historians in this field include Oliver Grau, Jon Ippolito, Christiane Paul, Frank Popper, Jasia Reichardt, Mario Costa, Christine Buci-Glucksmann, Dominique Moulon, Robert C. Morgan, Roy Ascott, Catherine Perret, Margot Lovejoy, Edmond Couchot, Fred Forest and Edward A. Shanken.
Subtypes
Art game
ASCII art
Chip art
Computer art scene
Computer music
Crypto art
Cyberarts
Digital illustration
Digital imaging
Digital literature
Digital painting
Digital photography
Digital poetry
Digital sculpture
Digital architecture
Dynamic Painting
Electronic music
Evolutionary art
Fractal art
Generative art
Generative music
GIF art
Immersion (virtual reality)
Interactive art
Internet art
Motion graphics
Music visualization
Photo manipulation
Pixel art
Render art
Software art
Systems art
Textures
Tradigital art
Related organizations and conferences
Artfutura
Artmedia
Austin Museum of Digital Art
Computer Arts Society
EVA Conferences
Los Angeles Center for Digital Art
Lumen Prize
onedotzero
V&A Digital Futures
See also
Algorithmic art
Computer art
Computer graphics
Electronic art
Generative art
New media art
Virtual art
Graphic arts
References
External links
Dreher, Thomas. "History of Computer Art"
Zorich, Diane M. "Transitioning to a Digital World"
|
20299758
|
https://en.wikipedia.org/wiki/UpStage
|
UpStage
|
UpStage is an open source server-side application that has been purpose built for Cyberformance: multiple artists collaborate in real time via the UpStage platform to create and present live theatrical performances, for audiences who can be online (from anywhere in the world) or in a shared space, and who can interact with the performance via a text chat tool. It can also be understood as a form of digital puppetry. It is the first open source platform designed specifically for avatar performances.
History and context
UpStage was developed during 2003 by programmer Douglas Bagnall to realise the vision of cyberformance troupe Avatar Body Collision; the group had been creating live performance on the internet using free chat applications such as and the Palace, and wanted to create an application that better met their artistic needs. The first version of the software was created with a grant from the Smash Palace Collaboration Fund, a joint initiative of Creative New Zealand and the NZ Ministry for Research, Science and Technology; it was launched on 9 January 2004 and began to be used by artists and students around the world, as well as by the originators, Avatar Body Collision.
In 2006, the School of Computing and Mathematical Sciences at the Auckland University of Technology began a relationship with the UpStage project, which has seen teams of final year software development students work on UpStage as a real-world software development project. This has provided invaluable ongoing maintenance and development for the software.
Also in 2006, UpStage received a second grant, this time from the Community Partnership Fund of the New Zealand government's Digital Strategy, which enabled the development of UpStage V2. Douglas Bagnall was once again the lead developer, working this time in conjunction with the AUT students. UpStage V2 was launched in June 2007, with a two-week exhibition at the New Zealand Film Archive and the first UpStage festival, 070707. The festival featured 13 performances by artists from around the world and took place over a 12-hour period on 7 July 2007.
A second festival was held on 080808 (8–9 August 2008), this time covering an 18-hour period and involving artists from at least 14 time zones. It was reviewed in the Australian Stage Online. Following this, festivals were held annually on the successive monthly dates until 121212 (12 December 2012) when the festival extended over a period of one week and included cyberformance in UpStage and other online platforms. A number of works from previous festivals were restaged as a retrospective programme within the festival.
Although "131313" was not possible, the tenth birthday of UpStage was celebrated 13 months after 121212, with a mini-festival of three performances and a meeting to discuss the future of UpStage. At this point, UpStage was unfunded and sustained by volunteers and the (also voluntary) work of the AUT student team. The meeting took place physically in Wellington, New Zealand, and online participants joined via UpStage. Everyone agreed that the project should continue – somehow – and also agreed that the software itself needs to be completely redeveloped, in order to take advantage of newer technologies and be more easily developed and maintained by globally dispersed open source developers. In 2020 with funding from Creative Europe for the project Mobilise/Demobilise, work on a complete rebuild of the platform was finally able to begin.
Features of UpStage
As a web-based server-side application, UpStage can be accessed by both performers and audiences from almost any internet connected computer, using any operating system and browser; computers behind firewalls may require specific ports to be open. Previously, UpStage used Flash to serve content to the browser, however this dependency is being removed in the current rebuild.
"Players" (performers) log into UpStage and have access to a "workshop" or backstage area where they can upload media (graphics and audio), create "stages", and assign media to stages. Once on the stage, a logged-in player has access to numerous tools which allow them to manipulate the media – place, move and speak aloud with graphical avatars (using text2speech), change backdrops, play audio files, draw directly on the stage in real time, add live web cam feeds, use text chat and perform other tasks in order to create and present a performance.
Audience members (also known as "chatters") do not log in – they simply follow a link from an email or another web page, and arrive at the stage which loads as a web page in their browser. They do not see any of the player tools, but they see and hear everything that the players are creating on the stage, and they can chat in the text chat along with the players. Audience chat appears grey and silent, while player chat is black and spoken aloud.
Newcomers (both players and audience) to UpStage can learn the basics very quickly, and the fact that no additional software download is required (unless the Flash player plug-in is not already installed) makes it very accessible. The chat interface encourages playful banter and audience members contribute to and embellish the performance via the chat.
The media used in UpStage performances is created outside of UpStage, using graphic or audio software. Once optimised for Upstage, it is then uploaded via the web interface known as the Workshop and becomes available to everyone who has a log in for that particular UpStage server.
UpStage is an open source project; it can be downloaded from the GitHub site and installed on a web server, giving control over who has log-in access. The interface can also be customised.
Artists using UpStage
Current:
Christina Papagiannouli and Etheatre
Clara Gomes
Gabriella Sacco, Floris Sirag and Petyr Veenstra
Helen Varley Jamieson
Katarina Djordjevic Urosevic & colleagues
Miljana Peric
Schaumbad Freies Atelierhaus Graz
Teater InterAkt
Vicki Smith
Past (a complete lists of artists who have worked with UpStage is available on the UpStage website):
Avatar Body Collision
ActiveLayers
Anaesthesia Associates
[Plaintext_Players] (Antoinette LaFarge & company)
Ben Unterman and colleagues
Marlena Corcoran
Pauline Bastard
Kristin Carlson & Sheila Page
Rebekah Wild
Helena Martin Franco
Further reading
Francesco Buonaiuto, Helen Varley Jamieson and Vicki Smith, The Net and the Butterfly, published in International Journal of Performance Arts and Digital Media Volume 10 Issue 1, 2014 - special issue on “Interdisciplinary Approaches to Documenting Performance”
Eliza Bent, Preview of the 121212 UpStage Festival of Cyberformance, American Theatre Magazine, 12 December 2012
Christina Papagiannouli, Cyberformance and the Cyberstage, published in the International Journal of the Arts in Society, vol 6 issue 4, 2011
Helen Varley Jamieson and Vicki Smith, UpStage: An Online Tool for Real-Time Storytelling, published in Creative Technologies Journal, Issue 2, November 2011
Su Ballard & Stella Brennan (eds), The Aotearoa Digital Arts Reader, published by Aotearoa Digital Arts and Clouds, August 2008.
Bree Hadley, 080808 UpStage Festival|080808 UpStage Festival, The Australian Stage Online, 9 August 2008
Helen Varley Jamieson, "UpStage: A Platform for Creating and Performing Online," IEEE MultiMedia, vol. 14, no. 3, pp. 8–10, Jul-Sept, 2007
Patricia Jung and Helen Varley Jamieson, "Online performances mit UpStage" - chapter in Video: Wiedergabe, Bearbeitung und Streaming unter Linux, ed. Nils Magnus and Torsten Spindler, published by Open Source Press, 2005.
Patricia Jung, "Performers Go Web", Linux Journal, April 2005;
References
External links
UpStage web site
UpStage on GitHub - complete rebuild of UpStage (2020-21)
We have a situation!
Theatre
Internet art
Digital art
Computer art
|
38015118
|
https://en.wikipedia.org/wiki/Apache%20Attic
|
Apache Attic
|
Apache Attic is a project of Apache Software Foundation to provide processes to make it clear when an Apache project has reached its end-of-life. The Attic project was created in November 2008. Also the retired projects can be retained.
Projects may not stay in the attic forever: e.g. Apache XMLBeans is now a project of Apache Poi, but was previously in the attic from July 2013 until June 2018.
Sub-Projects
This is a (non-exhaustive) list of Apache Attic projects:
Avalon: Apache Avalon was a computer software framework to provide a reusable component framework for container (server) applications.
Apex: Apache Apex was a YARN-native platform that unified stream and batch processing.
AxKit: Apache AxKit was an XML Apache publishing framework run by the Apache foundation written in Perl.
Beehive: Apache Beehive is a Java Application Framework designed to make the development of Java EE based applications quicker and easier.
C++ Standard Library: A set of classes and functions, which are written in the core language (code name stdcxx).
Click: Apache Click is a page- and component-oriented web application framework for Java EE and is built on top of the Java Servlet API.
Crimson: Crimson is a Java XML parser which supports XML 1.0 through Java API for XML Processing (JAXP) 1.1,SAX 2.0, SAX2 Extensions version 1.0 and DOM Level 2 Core Recommendation.
Excalibur: Apache Excalibur project produces a set of libraries for component based programming in the Java language.
Harmony: Apache Harmony was an open source, free Java implementation.
HiveMind: Apache HiveMind was a top level software project, for a framework written in Java. It takes the form of a services and configuration microkernel.
iBATIS: iBATIS is a persistence framework which automates the mapping between SQL databases and objects in Java, .NET, and Ruby on Rails.
Jakarta: The Jakarta Project created and maintained open source software for the Java platform.
Cactus: Cactus was a simple test framework for unit testing server-side Java code (Servlets, EJBs, Tag libs, ...) from the Jakarta Project.
ECS: ECS (Element Construction Set) was a Java API for generating elements for any of a variety of markup languages like HTML 4.0 and XML.
ORO: ORO was a set of text-processing Java classes that provide Perl5 compatible regular expressions, AWK-like regular expressions, glob expressions, and utility classes for performing substitutions, splits, filtering filenames, etc.
Regexp: Regexp was a pure Java Regular Expression package.
Slide: Slide is an open-source content management system from the Jakarta project. It is written in Java and implements the WebDAV protocol.
Taglibs: Taglibs was a large collection of JSP Tag Libraries.
ODE: ODE was a Java-based workflow engine to manage business processes which have been expressed in the Web Services Business Process Execution Language (WS-BPEL).
Ojb: Apache ObJectRelationalBridge (OJB) is an Object/Relational mapping tool that allows transparent persistence for Java Objects against relational databases.
Quetzalcoatl: Quetzalcoatl was a project charged with the creation and maintenance of open-source software related to mod_python and the Python programming language.
Shale: Shale is a web application framework which fundamentally based on JavaServer Faces.
Shindig: Shindig is an OpenSocial container. It provides the code to render gadgets, proxy requests, and handle REST and RPC requests.
Stratos: Stratos was a highly-extensible Platform-as-a-Service (PaaS) framework that helped run Apache Tomcat, PHP, and MySQL applications, and could be extended to support many more environments on all major cloud infrastructures.
Xang: Apache Xang was an XML Web Framework that aggregated multiple data sources, made that data URL addressable and defined custom methods to access that data.
Xindice: Apache Xindice was a native XML database.
Wink: Apache Wink is an open source framework that enables development and consumption of REST style web services.
References
External links
Home Page
Apache Software Foundation projects
|
1127585
|
https://en.wikipedia.org/wiki/Huazhong%20University%20of%20Science%20and%20Technology
|
Huazhong University of Science and Technology
|
The Huazhong University of Science and Technology (HUST; ) is a public research university located in Guanshan Subdistrict, Hongshan District, Wuhan, Hubei province, China. As a national key university directly affiliated to the Ministry of Education of China, HUST is a Project 985 and Class A Double First Class University. HUST manages Wuhan National Laboratories for Opto-electronics (WNLO), which is one of the five national laboratories in China. HUST is also one of four Chinese universities eligible to run the national laboratory and the national major science and technology infrastructure. Huazhong University of Science and Technology was one of two Chinese universities awarded with the University Leadership Award by the Society of Manufacturing Engineers (SME), and elected as "China's Top Ten Research Institutions" by the academic journal Nature, called "The epitome of the higher education development of People's Republic of China".
In recent years, the Huazhong University of Science and Technology (HUST) consistently features in the global top 200 research universities according to some of the most influential university rankings in the world such as ShanghaiRanking's Academic Ranking of World Universities, the Times Higher Education World University Rankings, and the U.S. News & World Report Best Global University Ranking.
History
Founding (1952–1954)
In 1952, the Central Government of China sought to construct a new higher education system for the rapid development of economy, science and technology after Chinese Civil War. Three technical institutes were planned to be established in Wuhan, including Huazhong Institute of Technology (HIT, 华中工学院), South-Central China Institute of Power Engineering () and South-Central China Institute of Water Conservancy and Electric Power () . In March 1953, the institute's charter was signed by the South-Central China Government under the approval of the Central Government of China. In the original planning, the land south of the Yujia Hill was chosen for the three campuses. Physicist was appointed as chair of the three-institute initiative. Economist Zhang Peigang was appointed as chief in planning to lead the HIT initiative. In June 1953, the land south of the East Lake was chosen as the campus of South-Central China Institute of Water Conservancy and Electric Power. The same year, the South-Central China government decided not to establish an independent South-Central China Institute of Power Engineering. All the programs related to power engineering were administered by Huazhong Institute of Technology. The institute formally opened on October 15, 1953.
Early development (1954–1966)
All the programs and departments at HIT were organized and formed from the programs related to electrical engineering, power engineering, electricity and mechanical engineering in Wuhan University, Hunan University, Guangxi University and South China Institute of Technology. HIT's first classes were held in spaces at those institutions. There were eight undergraduate programs, 314 full-time faculty members and 2,639 undergraduate students at that time. The first president is physicist Qian Zha, Dean of School of Engineering of Wuhan University. The first provost is Gancai Liu.
In 1960, HIT was evaluated to be a national key university under the direct administration of the Ministry of Education of China.
Cultural Revolution (1966–1976)
In 1971, most of the Wuhan Mechanical Institute () was merged into the institute.
Six departments were established. There were 20 undergraduate programs, 1,097 faculty members. The number of undergraduate students reached to 6,087.
New mission, global view (1976–1988)
Graduate students began to be enrolled in 1978, and in 1984, the institute became one of 22 universities to be approved by the State Council to establish a graduate school. By approval of the State Education Committee, the institute was renamed Huazhong University of Science and Technology (HUST, 华中理工大学) in 1988.
Leading the Reform in Tech-Schools (1988–2000)
With China's global strategy and the reform of the economy, HUST led a series of pivotal reforms among technical institutions in China. HUST is the first technical school to establish the Department of Journalism and Communication, the Department of Economics, and Department of Literature, and to host nationwide lectures in humanities.
Merger
On May 26, 2000, the former Huazhong University of Science and Technology, Tongji Medical University, Wuhan Urban Construction Institute (), and Wuhan Science and Technology Vocational College () combined to form the new Huazhong University of Science and Technology (); the Chinese name was changed, but the English name remained the same.
Tongji Medical College
The history of Tongji Medical College can be traced back to 1907 when Tongji German Medical School was founded by Erich Paulun in Shanghai. The name Tongji suggests cooperating by riding the same boat. In 1927, with the development of the institution, it expanded to include engineering programs. After the establishment of National Tongji University in 1927, the Tongji Medical College was affiliated to the university as one of the schools. In 1950, the medical school was moved to Wuhan from Shanghai and merged with Wuhan University School of Medicine to become South-Central China Tongji Medical College. The college was later renamed as Wuhan College of Medicine in 1955, as Tongji Medical University in 1985, and as Tongji Medical College of Huazhong University of Science and Technology in 2000.
Presidents
Zha Qian: (1953–1979)
Zhu Jiusi: (1979–1984)
Huang Shuhuai (1984–1993)
Yang Shuzi (1993–1997) Member of the Chinese Academy of Sciences
Zhou Ji (1997–2001) Member and former President of the Chinese Academy of Engineering
Fan Mingwu (2001–2005) Member of the Chinese Academy of Engineering, former President of China Institute of Atomic Energy
Li Peigen (2005–2014) Member of the Chinese Academy of Engineering
Ding Lieyun (2014–2018) Member of the Chinese Academy of Engineering
Li Yuanyuan (2018–present) Member of the Chinese Academy of Engineering
Campus
Huazhong University of Science and Technology has two campuses: Main Campus at Wuchang and Tongji Medical Campus at Hankou. The area of single campus is more than 7000 mu. The campus reaches 72% green rate and thus is also known as "Forest University".
Main Campus at Wuchang
1037 Luoyu Road, Wuchang, Wuhan
Tongji Medical Campus at Hankou
13 Hangkong Road, Hankou, Wuhan
Schools and departments
Sciences and Engineering
School of Physics
School of Automation
Department of Electronic Sci. & Tech.
Department of Electronics & Information Engr.
Department of Mathematics
School of Architecture & Urban Planning
School of Chemistry & Chemical Engr.
School of Computer Sciences & Engr.
School of Civil & Hydraulic Engineering.
School of Cyber Sciences & Engr.
School of Electrical & Electronic Engr.
School of Energy & Power Engineering
School of Environmental Science & Engr.
School of Life Sciences & Technology
School of Materials Science & Engr.
School of Mechanical Science & Engr.
School of Naval Architecture & Ocean Engr.
School of Aerospace Engineering
School of Optical & Electronic Information
School of Software Engineering
School of Transportation Sci. & Engr.
Social Sciences
Department of Chinese Literature
Department of Philosophy
Department of Political Science
Department of Sociology
School of Economics
School of Education
School of Foreign Language
School of Humanities & Social Sciences
School of International Education
School of Journalism & Communication
School of Law
School of Management
School of Public Administration
Medicine (Tongji Medical College)
Department of Forensic Medicine
Basic Medical School
School of Clinical Medicine I
School of Clinical Medicine II
School of Drug & Health Administration
School of Nursing
School of Pharmacy
School of Public Health
Academic Power
Faculty and staff
Faculty: 3,448
Staff (main campus): 7,659
Staff (hospitals): 5,259
Distinguished Youth Scholars awarded by National Science Fund: 69
Chang Jiang Scholars (Distinguished Professors): 65
Members of Chinese Academy of Sciences: 12
Members of Chinese Academy of Engineering: 17
National scientific platforms
National Laboratory
Wuhan National Laboratories for Opto-electronics (WNLO), one of the five national laboratories in China
National major science and technology infrastructure
Wuhan National High Magnetic Field Center, one of Top 4 magnetic field centers in the world, Top 1 in Asia.
Precision gravity measurement research facility, known as "World Gravity Center" by the international physics circle, measuring the most accurate gravitational constant in 2018.
National Innovation Institute
National Innovation Institute of Digital Design and Manufacturing
State Key Laboratory
State Key Laboratory of Digital Manufacturing Equipment and Technology
State Key Laboratory of Coal Combustion
State Key Laboratory of Materials Processing and Die & Mould Technology
State Key Laboratory of Advanced Electromagnetic Engineering and Technology (AEET)
National Engineering (Technology) Research Center
National Engineering Research Center for Laser Processing
National Engineering Research Center for Digital Manufacturing Equipment
National Engineering Technology Research Center for Enterprise Information Technology (CAD) Application Support Software (Wuhan)
National NC System Engineering Research Center
National Anti-counterfeiting Engineering Technology Research Center
National Nanomedical Engineering Technology Research Center
National Engineering Laboratory
National Engineering Laboratory of Next Generation Internet Access System
National Professional Laboratory
National Professional Laboratory of New Motor
National Professional Laboratory of External Storage Systems
Essential Science Indicators(ESI)
In ESI ranking in January 2021, Huazhong University of Science and Technology is ranked in 183th in the world, and 9th among all the Double First Class Universities in China. The numbers of top 1‰ and 1% disciplines of HUST in the world are 4 and 16 respectively.
Top 1‰ disciplines include Engineering, Computer Science, Materials Science and Clinic Medicine. Top 1% disciplines include Engineering, Computer Science, Materials Science, Clinic Medicine, Chemistry, Pharmacology & Toxicology, Biology & Biochemistry, Physics, Neuroscience & Behavior, Social Sciences, Molecular Biology & Genetics, Mathematics, Environment/Ecology, Agricultural Sciences, Botany and Zoology.
Discipline category
Undergraduate|Graduate
Engineering: #6 | #3;
Medicine: #2 | #2;
Management: #10 | #15;
Science: #16 | #17;
Economics: #20 |-;
Literature: #36 |-;
Natural Sciences (Engineering, Medicine, Science overall): #7 | #6;
Social Sciences (History, Management, Economics overall): #17 | #18
Programs
Mechanical Engineering: #1;
Electrical Engineering: #2;
Optical Engineering: #1;
Public Health: #1;
Public Administration: #4;
Biomedical Engineering: #5;
Control Engineering: #5 ;
Power Engineering: #6;
Computer Science: #9;
Electronics: #9;
Subjects
Preventive Medicine
Epidemiology: #5;
Environmental Health: #1;
Nutrition: #5;
Gynecology: #2;
Toxicology: #6;
Computer Science
System Structure: #3;
Software: #12 ;
Journalism & Communication
Journalism: #3;
Communication: #7;
Others
Statistics: #6;
Quantitative Economics: #3;
Rankings and reputation
2022 U.S. News & World Report Best Global University Ranking (U.S. News): 176th in the world, 24th in Asia and 10th in China.
2022 Times Higher Education (THE): 181th in the world, and the 10th in China.
2019 Academic Ranking of World Universities (ARWU): 101–150th in the world, and the 5th–8th in China.
2021 Academic Ranking of World Universities (ARWU): 101–150th in the world, and the 8th–10th in China.
2018 China University Ranking issued by Wu Shulian: the 8th in China.
2020 China University Ranking issued by Wu Shulian: the 7th in China.
2018 China Best University Ranking issued by Shanghai Ranking Consultancy (authorized by Education Ministry of China): the 8th in China.
2019 China Best University Ranking issued by Shanghai Ranking Consultancy (authorized by Education Ministry of China): the 7th in China.
2020 China Best University Ranking issued by Shanghai Ranking Consultancy (authorized by Education Ministry of China): the 8th in China.
Services
Libraries
There are four libraries at HUST: the Old Library, the Shaw Library (New Library), the Medical Library and the Architecture Library. The Old Library and the Shaw Library are located in the center of main campus. The Old Library was designed and constructed in Soviet Union style in the 1950s. It plays a major role in book circulation and conference hosting. It also provides classrooms for audio-video teaching program and some group-study programs. The first floor of the east wing is the Center for Reader's Services, which is a branch of University Bookstore System. The Shaw Library was donated by Sir Run Run Shaw and built in the 1990s. It has more than 30 reading rooms, including Chinese/English social sciences reading rooms, Chinese/English natural sciences reading rooms, Chinese/English archive reading rooms and electronic journal reading rooms. It also houses a multi-media center and a major branch of Center for Computing & Networking. Medical Library is located in Tongji Medical Campus in Hankou. It provides the same services to the medical students as the libraries in main campus. The Architecture Library is on the east side of the main campus. It accommodates books and journals in architecture and urban planning. The University Libraries have a total collection of 3.49 million volumes.
Student life
Student demographics
Undergraduate students: 36,275
Graduate & professional students: 20,044
International students: 4,100
Athletics
HUST men's basketball team has won national championship (CUBA) in 2004. HUST men's team also won the fourth place in CUBA 1999. HUST women's basketball team lost the national champion titles and won the second places in WCUBA 2005 and 2006.
Notable alumni
Politicians
Lou Qinjian, HUST Class 1981, CPC Secretary of Jiangsu Province, former Governor of Shaanxi Province and Vice Minister of Information Industry
Qian Xinzhong, Tongji Class 1928, Minister of Health, China (1965–1973, 1979–1983)
Xie Fuzhan, HUST Class 1980, President of Chinese Academy of Social Sciences, the former Governor of Henan Province, China.
Zhou Ji, HUST Class 1980, President, China Academy of Engineering (2010–2018), Minister of Education, China (2003–2009), Mayor of Wuhan (2001–2002)
Wang Cheng, HUST Class 1981, President, Hohai University.
Luo Jun, HUST Class 1978, President of Sun Yat-sen University, Professor of School of Physics in HUST.
Duan Xianzhong, HUST Class 1983, President of Hunan University.
Sportspeople
Li Ting, HUST Class 2006, tennis player, Gold Medal Winner at the 2004 Summer Olympics in women's doubles.
Li Na, HUST Class 2005, tennis player, Winner of Australian Open (2014) and French Open (2011), highest world ranking for Singles: No. 2.
Businesspeople
Gong Hongjia, HUST Class 1982, billionaire businessman, 137th in 2018 Forbes World billionaires list in 2018
Meng Wanzhou, chief financial officer and deputy board chairperson of Huawei.
Wang Chaoyong (汪潮涌), HUST Youth Class 1980, businessman.
Zhang Xiaolong, HUST Class 1991, Senior Vice President of Tencent, creator of WeChat.
Scientists
Julong Deng, the founder of Grey system theory.
Sifeng Liu, the Marie-Curie Fellow (UK), IEEE Fellow and the renowned expert of grey systems. He was one of the 10 shortlisted promising scientists in the MSCA (EU-funded Marie Curie Actions) 2017 Prizes.
Members of the China Academy of Sciences
Bei Shizhang, elected in 1955, Tongji Med BS (1921).
Liang Boqiang, elected in 1955, Pathologist, Tongji Med BS (1922).
Qiu Fazu, elected in 1993, Senior Member of CAS, Tongji Med BS (1936).
Wu Min (吴旻), elected in 1980, Tongji Med BS (1950).
Wu Mengchao, elected in 1991, 2005 National Supreme Science and Technology Awardee, Tongji Med BS (1949).
Yang Shuzi, elected in 1991, HUST BS (1956).
Cheng Shijie (程时杰), elected in 2007, HUST MS (1981).
Luo Jun (罗俊), elected in 2009, HUST BS (1982), MS (1985).
Ding Han (丁汉), elected in 2013, HUST Ph.D. (1989).
Chen Xiaoping (陈孝平), elected in 2015, HUST Tongji Med MS (1982), Ph.D. (1985).
Zhu Zhongliang (朱中梁), elected in 1999, HUST BS (1961).
Zheng Xiaojing (郑晓静), elected in 2009, President of Xi'an University of Electronic Science and Technology, HUST BS (1982).
Xu Tao (徐涛), elected in 2017, Vice President of University of the Chinese Academy of Sciences, HUST BS (1992), Ph.D. (1997).
Zhang Qingjie (张清杰), elected in 2017, President of Wuhan University of Technology, HUST BS (1984), Ph.D. (1990).
Fang Fuquan (方复全), elected in 2017, Vice President of Capital Normal University, HUST BS (1986).
Members of the China Academy of Engineering
Zhou Ji, elected in 1999, President of Chinese Academy of Engineering, foreign member of National Academy of Engineering (US), HUST MS (1980).
Hou Yunde, National Supreme Science and Technology Awardee (2018), Vice president of Chinese Academy of Engineering, HUST Tongji Med BS (1955).
Li Dequn (李德群), elected in 2015, HUST MS (1980).
Ma Ding (马丁), elected in 2017, HUST Tongji Med BS (1982), MS (1986), Ph.D. (1990).
Guo Konghui (郭孔辉), elected in 1994, HUST BS (1956).
Cen Kefa (岑可法), elected in 1995, HUST BS (1956).
Lu Daopei (陆道培), elected in 1996, HUST Tongji Med BS (1955).
Pan Yuan (潘桓), elected in 1997, HUST BS (1955).
Zhang Yongchuan (张勇传), elected in 1997, HUST BS (1957).
Yao Shaofu (姚绍福), elected in 1997, HUST BS (1954).
Fan Mingwu (樊明武), elected in 1999, Former president of HUST, Former president of the Chinese Academy of Atomic Energy Sciences, HUST BS (1965).
Li Peigen (李培根), elected in 2003, Former president of HUST, HUST MS (1981).
Ye Shenghua (叶声华), elected in 2003, HUST BS (1956).
Zhou Honghao (周宏灏), elected in 2005, HUST Tongji Med BS (1962).
Tan Jianrong (谭建荣), elected in 2007, HUST MS (1987).
Yang Baofeng (杨宝峰), elected in 2009, President of Harbin Medical University, HUST Tongji Med BS (1988).
Luo Xiwen (罗锡文), elected in 2009, Vice president of South China Agricultural University, HUST BS (1969).
Huang Weihe (黄维和), elected in 2013, HUST MS (1999).
Yang Huayong (杨华勇), elected in 2013, HUST BS (1982).
Guo Jianbo (郭剑波), elected in 2013, HUST BS (1982).
Hu Shengshou (胡盛寿), elected in 2013, HUST Tongji Med BS (1982).
You Zheng (尤政), elected in 2013, Vice president of Tsinghua University, HUST BS (1985), MS (1987), Ph.D. (1990).
Niu Xinqiang (钮新强), elected in 2013, HUST Ph.D. (2005).
Wu Weiren (吴伟仁), elected in 2015, Chief Designer of Lunar Exploration Engineering, HUST Ph.D. (2004).
Liu Jizhen (刘吉臻), elected in 2015, President of North China Electric Power University, HUST Ph.D. (2007).
Zou Xuexiao (邹学校), elected in 2017, President of Hunan Academy of Agricultural Sciences, HUST Ph.D. (2002).
References
External links
Huazhong University of Science and Technology
Universities in China with English-medium medical schools
Universities and colleges in Wuhan
Vice-ministerial universities in China
Project 985
Project 211
Universities and colleges formed by merger in China
|
8455151
|
https://en.wikipedia.org/wiki/Atari%20Program%20Exchange
|
Atari Program Exchange
|
Atari Program Exchange (APX) was a division of Atari, Inc. that sold software via mail-order for the Atari 8-bit family of home computers. Quarterly APX catalogs were sent to all registered Atari 8-bit owners. APX encouraged any programmer, not just professionals, to submit software for commercial distribution. If selected, a program was added to the catalog, with credit given to the programmer. The top submissions in each category were awarded, and several popular APX titles, such as Caverns of Mars, were moved to Atari's official product line.
The brainchild of Dale Yocum, the Atari Program Exchange started in February 1981. In 1982 its management was taken over by Fred Thorlin, who operated it until it closed. APX published quarterly catalogs until 1984, when new Atari CEO James J. Morgan closed down the mail-order division.
History
When Atari first launched the Atari 8-bit family in late 1979, the company kept most of the hardware details secret. It intended to be the primary supplier of software for the platform, as had been the case with the Atari 2600 console. By the end of the first year on the market increasingly sophisticated applications from outside Atari were nonetheless becoming available. There were, however, a limited number of distribution channels at the time.
Dale Yocum approached Atari with the idea of setting up their own third-party publishing arm. With Atari's distribution capabilities the products would be seen by many more prospective customers, and at the same time, Atari would make money with every sale, money that would otherwise be lost. Chris Crawford later stated:
Catalogs
Atari mailed catalogs to all computer owners who sent in warranty cards. The first issue of the catalog, dated summer 1981, stated that while "Atari offers a wide variety of useful and entertaining software ... we've come across other interesting software deserving public recognition ... [APX] will make such software available quickly and inexpensively ... We'll keep costs down [by using] simple packaging and we'll rely on user-written documentation ... What we'll offer, then, is a lot of interesting software quickly and inexpensively".
The quarterly publication included descriptions and screenshots of each program, and advertisements for computer magazines. Other products sold included the book De Re Atari and various peripherals. Many APX programs were games, but it distributed a wide variety of applications, utilities, programming tools, and educational software.
Discontinuation
According to Atari CEO Morgan, APX was losing money in its mail-order business so that part was shut down:
After the discontinuation of APX, Antic magazine published some APX titles as APX Classics from Antic and continued soliciting new software as Antic Software. The Antic Software catalog, created by Gary Yost, was bound into issues of the magazine.
Products
Atari Star winners
In 1981 APX announced an award program, the Atari Star, with quarterly and yearly cash awards. All programs submitted for publishing were eligible. The annual grand prize for the best program was a trophy and $25,000. The first winner was the educational game My First Alphabet by Fernando Herrera. He used the money to cofound video game developer and publisher First Star Software which sold several of his games, including Astro Chase and Bristles.
The 1982 winner was Typo Attack by David Buehler, a game designed to improve touch typing skill. Atari published it as a cartridge in 1984.
The 1983 winner was Getaway! by Mark Reid, a maze chase game taking place across a large, scrolling city map. According to Reid, there was talk of moving the game into Atari's product line, but Atari's troubles stemming from the video game crash of 1983 kept this from happening.
Others
Eastern Front (1941), written by Chris Crawford, was the Atari Program Exchange's most popular program. The source code for Eastern Front, and a scenario editor, were sold separately. Eastern Front and vertically-scrolling shooter Caverns of Mars were both converted to ROM cartridges and became part of the official Atari product line. One of Crawford's later games, Excalibur, was also sold through APX.
John Palevich's Dandy inspired the arcade game Gauntlet and became the home game Dark Chambers.
One of APX's top sellers was neither software nor user-written: the book De Re Atari, which contains information about the proprietary hardware of the Atari 8-bit computers.
Atari distributed two official arcade ports through APX: 1978's Avalanche, credited to Dennis Koble, who wrote the original arcade game, and 1982 platformer Kangaroo, which was uncredited.
References
External links
APX info at Atari Archives including scans of catalogs and list of programs.
Defunct software companies
Atari 8-bit family
|
59153
|
https://en.wikipedia.org/wiki/Ampersand
|
Ampersand
|
The ampersand, also known as the and sign, is the logogram , representing the conjunction "and". It originated as a ligature of the letters et—Latin for "and".
Etymology
Traditionally, when reciting the alphabet in English-speaking schools, any letter that could also be used as a word in itself ("A", "I", and, "O") was repeated with the Latin expression ('by itself'), as in "A per se A". It was also common practice to add the sign at the end of the alphabet as if it were the 27th letter, pronounced as the Latin et or later in English as and. As a result, the recitation of the alphabet would end in "X, Y, Z, and per se and". This last phrase was routinely slurred to "ampersand" and the term had entered common English usage by 1837.
It has been falsely claimed that André-Marie Ampère used the symbol in his widely read publications and that people began calling the new shape "Ampère's and".
History
The ampersand can be traced back to the 1st century A.D. and the Old Roman cursive, in which the letters E and T occasionally were written together to form a ligature (Evolution of the ampersand – figure 1). In the later and more flowing New Roman Cursive, ligatures of all kinds were extremely common; figures 2 and 3 from the middle of 4th century are examples of how the et-ligature could look in this script. During the later development of the Latin script leading up to Carolingian minuscule (9th century) the use of ligatures in general diminished. The et-ligature, however, continued to be used and gradually became more stylized and less revealing of its origin (figures 4–6).
The modern italic type ampersand is a kind of "et" ligature that goes back to the cursive scripts developed during the Renaissance. After the advent of printing in Europe in 1455, printers made extensive use of both the italic and Roman ampersands. Since the ampersand's roots go back to Roman times, many languages that use a variation of the Latin alphabet make use of it.
The ampersand often appeared as a character at the end of the Latin alphabet, as for example in Byrhtferð's list of letters from 1011. Similarly, was regarded as the 27th letter of the English alphabet, as taught to children in the US and elsewhere. An example may be seen in M. B. Moore's 1863 book The Dixie Primer, for the Little Folks. In her 1859 novel Adam Bede, George Eliot refers to this when she makes Jacob Storey say: "He thought it [Z] had only been put to finish off th' alphabet like; though ampusand would ha' done as well, for what he could see." The popular nursery rhyme Apple Pie ABC finishes with the lines "X, Y, Z, and ampersand, All wished for a piece in hand".
The ampersand should not be confused with the Tironian "et" , which has the same meaning, but which in appearance resembles the numeral . Both symbols have their roots in the classical antiquity, and both signs were used throughout the Middle Ages as a representation for the Latin word et ("and"). However, while the ampersand was in origin a common ligature in everyday script, the Tironian et was part of a highly specialised stenographic shorthand. The Tironian et (⁊) is found in Old Irish language script, a Latin-based script generally only used for decorative purposes today, where it signifies ("and") in Irish. This symbol may have entered the script language by way of monastic influence in the time of the early Christian church in Ireland.
Writing the ampersand
In everyday handwriting, the ampersand is sometimes simplified in design as a large lowercase epsilon or a reversed numeral , superimposed by a vertical line. The ampersand is also sometimes shown as an epsilon with a vertical line above and below it or a dot above and below it.
The plus sign (itself based on an et-ligature) is often informally used in place of an ampersand, sometimes with an added loop and resembling .
Usage
Ampersands are commonly seen in business names formed from partnership of two or more people, such as Johnson & Johnson, Dolce & Gabbana, Marks & Spencer, and Tiffany & Co., as well as some abbreviations containing the word and, such as AT&T (American Telephone and Telegraph), A&P (supermarkets), R&D (research and development), D&B (drum and bass), D&D (Dungeons & Dragons), R&B (rhythm and blues), B&B (bed and breakfast), and P&L (profit and loss).
In film credits for stories, screenplays, etc., & indicates a closer collaboration than and. The ampersand is used by the Writers Guild of America to denote two writers collaborating on a specific script, rather than one writer rewriting another's work. In screenplays, two authors joined with & collaborated on the script, while two authors joined with and worked on the script at different times and may not have consulted each other at all. In the latter case, they both contributed enough significant material to the screenplay to receive credit but did not work together. As a result, both & and and may appear in the same credit, as appropriate to how the writing proceeded.
In APA style, the ampersand is used when citing sources in text such as (Jones & Jones, 2005). In the list of references, an ampersand precedes the last author's name when there is more than one author. (This does not apply to MLA style, which calls for the "and" to be spelled.)
The phrase ("and so forth"), usually written as etc. can be abbreviated &c. representing the combination et + c(etera).
The ampersand can be used to indicate that the "and" in a listed item is a part of the item's name and not a separator (e.g. "Rock, pop, rhythm & blues, and hip hop").
The ampersand may still be used as an abbreviation for "and" in informal writing regardless of how "and" is used.
Computing
Encoding and display
The character in Unicode is ; this is inherited from the same value in ASCII.
Apart from this, Unicode also has the following variants:
The last six of these are carryovers from the Wingdings fonts, and are meant only for backward compatibility with those fonts.
On the QWERTY keyboard layout, the ampersand is . It is almost always available on keyboard layouts, sometimes on or . On the AZERTY keyboard layout, is an unmodified keystroke, positioned above .
In URLs, the ampersand must be replaced by %26 when representing a string character to avoid interpretation as a URL syntax character.
Programming languages
In the 20th century, following the development of formal logic, the ampersand became a commonly used logical notation for the binary operator or sentential connective AND. This usage was adopted in computing.
Many languages with syntax derived from C, including C++, Perl, and more differentiate between:
for bitwise AND. is zero, is 4.
for short-circuit logical AND. is true.
In C, C++, and Go, a prefix is a unary operator denoting the address in memory of the argument, e.g. .
In C++ and PHP, unary prefix before a formal parameter of a function denotes pass-by-reference.
In Pascal, the as the first character of an identifier prevents the compiler from treating it as a keyword, thus escaping it.
In Fortran, the ampersand forces the compiler to treat two lines as one. This is accomplished by placing an ampersand at the end of the first line and at the beginning of the second line.
In many implementations of ALGOL 60 the ampersand denotes the tens exponent of a real number.
In Common Lisp, the ampersand is the prefix for lambda list keywords.
Ampersand is the string concatenation operator in many BASIC dialects, AppleScript, Lingo, HyperTalk, and FileMaker. In Ada it applies to all one-dimensional arrays, not just strings.
BASIC-PLUS on the DEC PDP-11 uses the ampersand as a short form of the verb .
Applesoft BASIC used the ampersand as an internal command, not intended to be used for general programming, that invoked a machine language program in the computer's ROM.
In some versions of BASIC, unary suffix & denotes a variable is of type long, or 32 bits in length.
The ampersand was occasionally used as a prefix to denote a hexadecimal number, such as for decimal 255, for instance in BBC BASIC. (The modern convention is to use "x" as a prefix to denote hexadecimal, thus .) Some other languages, such as the Monitor built into ROM on the Commodore 128, used it to indicate octal instead, a convention that spread throughout the Commodore community and is now used in the VICE emulator.
In MySQL, has dual roles. As well as a logical AND, it additionally serves as the bitwise operator of an intersection between elements.
Dyalog APL uses ampersand similarly to Unix shells, spawning a separate green thread upon application of a function.
In more recent years, the ampersand has made its way into the Haskell standard library, representing flipped function application: means the same thing as .
Perl uses the ampersand as a sigil to refer to subroutines:
In Perl 4 and earlier, it was effectively required to call user-defined subroutines
In Perl 5, it can still be used to modify the way user-defined subroutines are called
In Raku (formerly known as Perl 6), the ampersand sigil is only used when referring to a subroutine as an object, never when calling it
In MASM 80x86 Assembly Language, is the Substitution Operator, which tells the assembler to replace a macro parameter or text macro name with its actual value.
Ampersand is the name of a reactive programming language, which uses relation algebra to specify information systems.
Text markup
In SGML, XML, and HTML, the ampersand is used to introduce an SGML entity, such as (for non-breaking space) or (for the Greek letter α). The HTML and XML encoding for the ampersand character is the entity . This can create a problem known as delimiter collision when converting text into one of these markup languages. For instance, when putting URLs or other material containing ampersands into XML format files such as RSS files the & must be replaced with & or they are considered not well formed, and computers will be unable to read the files correctly. SGML derived the use from IBM Generalized Markup Language, which was one of many IBM-mainframe languages to use the ampersand to signal a text substitution, eventually going back to System/360 macro assembly language.
In the plain TeX markup language, the ampersand is used to mark tabstops. The ampersand itself can be applied in TeX with . The Computer Modern fonts replace it with an "E.T." symbol in the (text italic) fonts, so it can be entered as in running text when using the default (Computer Modern) fonts.
In Microsoft Windows menus, labels, and other captions, the ampersand is used to denote the next letter as a keyboard shortcut (called an "Access key" by Microsoft). For instance setting a button label to makes it display as rint and for to be a shortcut equivalent to pressing that button. A double ampersand is needed in order to display a real ampersand. This convention originated in the first WIN32 api, and is used in Windows Forms, (but not WPF, which uses underscore for this purpose) and is also copied into many other toolkits on multiple operating systems. Sometimes this causes problems similar to other programs that fail to sanitize markup from user input, for instance Navision databases have trouble if this character in either "Text" or "Code" fields.
Unix shells
Some Unix shells use the ampersand as a metacharacter:
Some Unix shells, like the POSIX standard sh shell, use an ampersand to execute a process in the background and to duplicate file descriptors.
In Bash, the ampersand can separate words, control the command history, duplicate file descriptors, perform logical operations, control jobs, and participate in regular expressions.
Web standards
The generic URL (Uniform Resource Locator) syntax allows for a query string to be appended to a file name in a web address so that additional information can be passed to a script; the question mark, or query mark, , is used to indicate the start of a query string. A query string is usually made up of a number of different name–value pairs, each separated by the ampersand symbol, . For example, .
See also
And (disambiguation)
List of typographical symbols and punctuation marks
Kai (abbreviation)
Heta
Tironian notes
References
External links
The Hot Word at Dictionary.com: How ampersand came from a misunderstanding
"Ask the Editor: Ampersand", video at Merriam-Webster.com (2:01). Retrieved 2013-10-18
Font of 52 ampersands, designed by Frederic Goudy
Latin-script ligatures
Logic symbols
Typographical symbols
Graphemes
Punctuation
|
3530076
|
https://en.wikipedia.org/wiki/Integrated%20Encryption%20Scheme
|
Integrated Encryption Scheme
|
Integrated Encryption Scheme (IES) is a hybrid encryption scheme which provides semantic security against an adversary who is able to use chosen-plaintext or chosen-ciphertext attacks. The security of the scheme is based on the computational Diffie–Hellman problem.
Two variants of IES are specified: Discrete Logarithm Integrated Encryption Scheme (DLIES) and Elliptic Curve Integrated Encryption Scheme (ECIES), which is also known as the Elliptic Curve Augmented Encryption Scheme or simply the Elliptic Curve Encryption Scheme. These two variants are identical up to the change of an underlying group.
Informal description of DLIES
As a brief and informal description and overview of how IES works, a Discrete Logarithm Integrated Encryption Scheme (DLIES) is used, focusing on illuminating the reader's understanding, rather than precise technical details.
Alice learns Bob's public key through a public key infrastructure or some other distribution method.Bob knows his own private key .
Alice generates a fresh, ephemeral value , and its associated public value .
Alice then computes a symmetric key using this information and a key derivation function (KDF) as follows:
Alice computes her ciphertext from her actual message (by symmetric encryption of ) encrypted with the key (using an authenticated encryption scheme) as follows:
Alice transmits (in a single message) both the public ephemeral and the ciphertext .
Bob, knowing and , can now compute and decrypt from .
Note that the scheme does not provide Bob with any assurance as to who really sent the message: This scheme does nothing to stop anyone from pretending to be Alice.
Formal description of ECIES
Required information
To send an encrypted message to Bob using ECIES, Alice needs the following information:
The cryptography suite to be used, including a key derivation function (e.g., ANSI-X9.63-KDF with SHA-1 option), a message authentication code (e.g., HMAC-SHA-1-160 with 160-bit keys or HMAC-SHA-1-80 with 80-bit keys) and a symmetric encryption scheme (e.g., TDEA in CBC mode or XOR encryption scheme) — noted .
The elliptic curve domain parameters: for a curve over a prime field or for a curve over a binary field.
Bob's public key , which Bob generates it as follows: , where is the private key he chooses at random.
Some optional shared information: and
which denotes the point at infinity.
Encryption
To encrypt a message Alice does the following:
generates a random number and calculates
derives a shared secret: , where (and )
uses a KDF to derive symmetric encryption keys and MAC keys:
encrypts the message:
computes the tag of encrypted message and :
outputs
Decryption
To decrypt the ciphertext Bob does the following:
derives the shared secret: , where (it is the same as the one Alice derived because ), or outputs failed if
derives keys the same way as Alice did:
uses MAC to check the tag and outputs failed if
uses symmetric encryption scheme to decrypt the message
Implementations of ECIES
Botan
Bouncy Castle
BSAFE
Crypto++
wolfSSL
References
SECG, Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography, Version 2.0, May 21, 2009.
Gayoso Martínez, Hernández Encinas, Sánchez Ávila: A Survey of the Elliptic Curve Integrated Encryption Scheme, Journal of Computer Science and Engineering, 2, 2 (2010), 7–13.
Ladar Levison: Code for using ECIES to protect data (ECC + AES + SHA), openssl-devel mailing list, August 6, 2010.
IEEE 1363a (non-public standard) specifies DLIES and ECIES
ANSI X9.63 (non-public standard)
ISO/IEC 18033-2 (non-public standard)
Victor Shoup, A proposal for an ISO standard for public key encryption, Version 2.1, December 20, 2001.
Abdalla, Michel and Bellare, Mihir and Rogaway, Phillip: DHIES: An Encryption Scheme Based on the Diffie–Hellman Problem, IACR Cryptology ePrint Archive, 1999.
Cryptographic protocols
|
8952943
|
https://en.wikipedia.org/wiki/CricketGraph
|
CricketGraph
|
CricketGraph was a graphic software program for the Apple Macintosh by Cricket Software sold until 1996. It could take tabulated data and create common business and statistics graphs such as bar chart, pie chart, scatter plots and radial plots. These graphs could be saved in common image formats such as PICT and EPS and added to other documents. It did not have the same capabilities as a spreadsheet.
Competition
The main competitor was Visual Business, as well as the built-in graphing packages in Microsoft Excel, Informix Wingz and specialty statistics software such as Systat.
Although this package was written cleanly enough to run on much later versions of Classic Mac OS, the feature set was eventually superseded by packages such as DataGraph, DeltaGraph and KaleidaGraph.
See also
List of information graphics software
References
Plotting software
Classic Mac OS software
|
42793025
|
https://en.wikipedia.org/wiki/ITT%20465L%20Strategic%20Air%20Command%20Control%20System
|
ITT 465L Strategic Air Command Control System
|
The ITT 465L Strategic Air Command Control System (SACCS, SAC Control System, 465L Project, 465L Program) was a Cold War "Big L" network of computer and communication systems for command and control of Strategic Air Command "combat aircraft, refueling tankers, [and] ballistic missiles". International Telephone and Telegraph was the prime contractor for Project 465, and SACCS had "Cross Tell Links" between command posts at Offutt AFB, March AFB, & Barksdale AFB (SACCS also communicated with the Cheyenne Mountain Complex and Air Force command posts. The 465L System included IBM AN/FSQ-31 SAC Data Processing Systems, Remote (RCC) and Simplex Remote Communication Systems (SRCC), SAC Network Control Office, "4-wire, Schedule 4,
Type 4B alternate voice-data operation", and one-way communication with "ICBM launch control centers" (the SAC Digital Network upgraded to two-way communications.) In addition to IBM for the "Super SAGE type computers", another of the 6 direct subcontractors was AT&T ("end-to-end control" of the communications circuits),
Background
Strategic Air Command began using the telephonic Army Command and Administrative Net (ACAN) in 1946 until switching to the 1949 USAF AIRCOMNET "command teletype network" (the independent Strategic Operational Control System or SOCS with telephones and teletype was "fully installed by 1 May 1950".) SACE deployed a worldwide communications network in 1958 with a day-to-day telephone system, a teletype system, an SSB HF system, and the Primary Alert System--"a direct line telephone system between the SAC underground command post and all its subordinate command and control centers (numbered air force and wing command posts)."
1st IBM "Big L" system In 1955 the Experimental SAGE Subsector was completed with a simplex IBM XD-1 prototype of the AN/FSQ-7 planned for the SAGE computer network, and IBM Federal Systems subsequently built dozens of vacuum tube computers for the AN/FSQ-8 and AN/FSQ-7 centrals of Support System 416L (SS-416L), the 1st "Big L" system. SAGE radar stations used AN/FST-2 sets for transferring data, and GATR sites and BOMARC Ground-to-Air Transmitter Facilities provided radio control for ground-controlled interception. An IBM AN/FSQ-32 transistorized SAGE central was announced in June 1958 and was to planned for in several NORAD nuclear bunkers, but the Super Combat Centers were cancelled in 196x. The transistorized central "was given to SDC to be used for the ARPA command-control R&D program", and the USAF "later took back [the Q-32] from SDC to SAC HQ at Omaha" for the "ADEPT…status reporting system".
In 1956, CINCSAC determined SAC's leased teleprinter (teletype) circuits and radio links were too slow, and SAC began using a computer in 1957. A SAC Liaison Team was located at the NORAD command post beginning 1 February 1958, and the 2 commands agreed direct land lines should connect SAC bases and Air Defense Direction Centers. After CONAD designated 3 "SAC Base Complexes" (geographical areas) by 1956--Northwestern United States, Montana-through-North Dakota area, and the largest: a nearly-triangular "South Central Area" from Minnesota to New Mexico to Northern Florida—NORAD's Alert Network Number 1 became operational on July 1, 1958, with the 1957 SAC nuclear bunker as 1 of the network's 29 transmit/receive stations.
Development
On February 11, 1958, Headquarters USAF published General Operational Requirement or GOR 168 for SACCS (the Westover AFB command post was to get a computer system) and on April 1, HQ USAF changed the SACCS designator from Program 133L to 465L. SAC's QOR for the National Survivable Communications System (NSCS) was issued September 13, 1958, and in October 1959 the systems cost had increased from $139.7 million to $339.8 million in 12 months: the Office of the Secretary of Defense—with "doubts regarding the validity of the entire 465L concept"—cut the program by December 1. In September 1960 the "installation of a SAC display warning system" included 3 consoles (e.g., BMEWS Display Information Processor (DIP) in the Offutt bunker and on 7 December I960, the 465L Program was cut to ""a most austere approach" (an austere air defense sector was also established for NORAD, which soon planned a smaller BUIC control system.) "In July 1961, the Department of Defense redirected SACCS 465L to a pre-strike system and established a separate [airborne] post-attack command control system with air and ground elements.
by 1962, "SAC installations, inclusive of those overseas and of tenant bases, peaked at 85". "Project 465L, the SAC Control System (SACCS) [with] over a million lines, reached four times the size of the SAGE code and consumed 1,400 man-years of programming; SDC invented a major computer language, JOVIAL, specifically for this project."
SACCS "was delivered to Strategic Air Command by the contractor in March 1965" and was designed to survive nuclear attack and to provide rapid transmission, processing, and display of information to support command and control of SAC's geographically separated forces. On January 1, 1968, the SACCS attained operational capability (maintenance at Offutt and March were by the respective 55th Strategic and 33rd Communications Squadrons.) During construction of NORAD's nuclear bunker, SAC's 1963 plan for construction of a Deep Underground Command Center in Colorado beginning in 1965 was cancelled.
In 1968, "after SAC completed its tests during March, AFSC arranged for modification of the SAC terminals for use with LES-6" for satellite communications. A SACCS remote communications van completed on 12 July 1968 was shipped to Andersen AFB, Guam, e.g., for supporting the SACADVON (30 SAC B-52s had deployed on 17 February 1965 to Guam for the Vietnam War.)
Gradual replacement
On October 6, 1975, SACCS officially integrated with the Worldwide Military Command and Control System when the original IBM 4020 Military Computers were replaced by Honeywell 6080 computers (remaining FSQ-31 components were entirely decommissioned in November.) Offutt became part of the WWMCCS Intercomputer Network as one of "six initial WIN sites in 1977" (20 sites by 1981). A 1977 plan was for SACCS to be replaced by the ITT SAC Automated Total Information Network (SATIN IV), "a totally new command and control system " (ITT had won the initial SATIN IV contract over Sylvania.)
Replaced DTS
Instead of SATIN IV, a restructured plan deployed the Strategic Air Command Digital Information Network to replace SACCS "Data Transmission Subsystem and part of the Data Display Subsystem", e.g., on November 5, 1986, "Martin Marietta Corporation technicians began installing SAC Digital Network (SACDIN) equipment in 91st Strategic Missile Wing missile launch control centers (i.e., either a HUTE rack or MBCP rack). On February 20, 1987, "SAC declared initial operational capability for the SAC Digital Network when [it] operated successfully between the Headquarters SAC Command Center and the 55th Strategic Reconnaissance Wing Command Post, both located at Offutt AFB, Nebraska, and the 351st Strategic Missile Wing Command Post at Whiteman AFB, Missouri." SACDIN eventually "linked 135 locations and permitted two-way message communications with ICBM launch control centers for the first time," and the Ground Wave Emergency Network communication system had a Final Environmental Impact Statement issued in September 1987.
On May 6, 1988, "software became operational on three Post Attack Command and Control aircraft making the common Airborne Launch Control Center fully capable of launching Peacekeeper and Minuteman missiles."
SAC Automated Command and Control System
In 1990 when the 465L System had been entirely replaced by the "SAC Auto Cmd/Ctl Sys" for several years, the SAC C2 system continued using that name as part (except for the SACCS Data Processing System) of "USSTRATCOM Command and Control" (PE 0101316F). By 1995, the "emergency war order (EWO) communication systems consist[ed] of the primary alert system (PAS), SAC digital network (SACDIN), survivable low frequency communication system (SLFCS), Air Force satellite communications system (AFSATCOM), [ICBM] Super High Frequency Satellite Terminal (ISST) and [UHF] voice radio communication systems" The USSTRATCOM SACCS was redesignated Strategic Automated Command and Control System with the same acronym on tbd\ and by 2011, the Minimum Essential Emergency Communications Network was being modernized in the Nuclear Command and Control System. By February 2012, USSTRATCOM was using the Integrated Strategic Planning and Analysis Network (ISPAN), and the USSTRATCOM Replacement Facility Fit-Out (PE 0303255F) was to "include secure HEMP-Shielded Command and Control Center, mainframe computer data centers, multiple 24/7 mission operations centers, storage and maintenance areas, labs/workrooms, back-up generators, Uninterruptible Power Source, Technical Control Facility, Fiber Ring, [with funding] beginning in FY13."
References
ITT Inc.
Strategic Air Command command and control systems
|
12697889
|
https://en.wikipedia.org/wiki/Demonoid
|
Demonoid
|
Demonoid is a BitTorrent tracker and website founded in 2003 to facilitate file-sharing related discussion and provide a searchable index of torrent files. The site underwent intermittent periods of extended downtime in its history due to the occasional need to move the server, generally caused by cancellation of ISP service due to local political pressure.
Reports announced the accidental death of its founder Deimos in August 2018. Following the event, the website was closed on September 17, 2018. In July 2019, Demonoid staffers launched a new version of the website to revive the project.
Features and policies
Demonoid features RSS with different feeds for each of its torrent categories and their sub-categories. It tracked and displayed users' upload/download ratios, but, except in its early years, took no action against users with low ratios (members who took more than they share). The website previously banned users with low ratios, but stopped doing so due to the ratio system being inaccurate for some users, such as those with dynamic IP addresses.
Demonoid prohibits linking to torrents containing pornographic material and malicious software. In addition to forums, the website features an IRC channel, #demonoid at P2P-Network, which supports discussion among users.
History
Demonoid was founded on April 21, 2003 by a Klingon Internet user known under the pseudonym of 'Deimos'. It initially worked as a fully-private BitTorrent tracker with intermittent periods of open registrations. From the mid-2000s, Demonoid grew as one of the largest trackers in the world along with The Pirate Bay, which led to an increase in legal threats from copyright owners.
On April 10, 2008, Deimos stepped down as the administrator of Demonoid, citing a number of reasons and "distraction with real-world issues". He also stated that he has "handed the reins over to a new administrator" – "a close friend of [his]", whom they trust completely and has the knowledge and time to take care of the site. Over the course of the next few days, RSS feeds for the site came back online and by April 16, 2008 a mass email was sent out to all Demonoid users informing that the site was "finally back online."
The official explanation read as follows:
In August 2012, Deimos faced criminal investigation in Mexico, and was eventually released from jail in February 2013. After a decrease in the audience during the 2010s, he was reportedly working in early 2018 to rebuild the website to the thriving community of the previous decade. Deimos died in an accident in August 2018, leading to the closure of Demonoid on September 17, 2018. In July 2019, staff of the original community relaunched the website.
Legal issues
In a 2007 study, Slyck.com found twelve cease and desist letters to users of Demonoid. On September 25, 2007, the Demonoid website, forums and trackers went offline. They came back four days later with the exception of the website, which came back the day after. Over the next few days, the website continued experiencing intermittent downtime until October 2, 2007. The explanation as widely speculated was that they had received a letter from a lawyer for the Canadian Recording Industry Association threatening legal action. Demonoid began blocking Canadian traffic, a strategy similar to that taken by isoHunt and TorrentSpy in blocking American traffic to avoid RIAA complaints. Visitors from Canadian-based IPs would be redirected to the downtime version of the website, which contained an explanation of the legal threats. However, it was still possible for Canadians to visit the website at that time using proxy servers. Additionally, while the website may have been blocked in Canada at the time, the tracker was still readily accepting Canadian IP addresses.
The threats are in spite of the open question of the legality of music file sharing in Canada. The CRIA has neither confirmed nor denied its involvement despite Demonoid's claims.
On November 9, 2007, the site again went offline, reportedly due to legal threats to their service provider from the Canadian Recording Industry Association. A placeholder page stated, "The CRIA threatened the company renting the servers to us, and because of this it is not possible to keep the site online. Sorry for the inconvenience and thanks for your understanding." According to the IRC channel, the trackers themselves were not affected. Six days later, the placeholder page was updated with a link to a new forum, unrelated to file sharing, for the community. On November 29, 2007, Deimos posted on that forum a problem preventing the site from coming back up:
The site then came back online on April 11, 2008. The homepage announced that the site had a new administrator, and that the old one (Deimos) had left for personal reasons.
Technical issues
Website downtime
Demonoid experienced a prolonged downtime in late 2009 due to hardware failure. On September 14, 2009, Demonoid's torrent tracker went down after it was reported that they had experienced a number of hardware problems stemming from power outages. The tracker returned to service on November 5, and the main site returned on December 13. A message was posted on the homepage stating that "We might have to shut down everything to fix and prevent further damage," and that it could be "days maybe, until we can change the power circuit." During the downtime that followed, several new messages appeared, mostly providing updates on the repair status and promising that the site would return soon. On November 4, 2009, the tracker, which communicates with a BitTorrent client, began responding to some torrents, and returned to full operation on November 17. The main site, however, did not become operational until December 13, 2009.
On April 26, 2010, Demonoid.com, started experiencing downtime or extreme slowness. A message was posted on the site that it was due to a denial-of-service attack, which has subsided as of July 2010. The site temporarily banned Taiwanese and Chinese IP ranges.
On July 24, 2012, Demonoid.me suffered another denial-of-service attack, bringing the site down for an indeterminate amount of time. The following week, its hosting provider, ColoCall, terminated its contract with Demonoid. An anonymous ColoCall source reported that the Ukrainian police had raided the hosting provider and seized Demonoid's data. However, according to the Ministry of Internal Affairs in Ukraine, the termination occurred without police intervention. No explanation has been given for the prolonged downtime, nor was there any word about the site's return until March 2014.
On November 12, 2012, demonoid.me began resolving to an IP address based in Hong Kong, where a tracker was operating. The tracker did not accept new torrents, but honored existing ones. However, the website and forums remained offline. The tracker went offline on December 15, 2012, first actively refusing all connections, and then becoming unreachable when demonoid.me's DNS servers went down.
In November 2013, demonoid.me and demonoid.ph started redirecting to demonoid.com, whose website began displaying a page that hints at a possible comeback of the site, with the message "We will rebuild! Coming back soon, please check back later. Thanks for your visit!!" along with a Bitcoin donation link. On January 9, 2014, a tracker came online at inferno.demonoid.com and quickly became one of the five busiest BitTorrent trackers on the Internet; in only a few hours, the tracker was coordinating the communication of 1.3 million people scattered across 388,321 torrent files.
In March 2014, after 20 months of downtime, the Demonoid BitTorrent tracker came back online. Former users were still able to use their login details, and most of the old torrents were still listed on the site. In July 2018, Demonoid stopped working on all used domains. The issues are related to server-side problems. There are no backups or mirrors on the internet.
Domain name changes
On December 2, 2010, Demonoid changed its domain from .com to a .me address, to avoid US government seizure. In April 2012, the website changed its domain to a .ph TLD, and started an open beta of the new site on Demonoid.me. On June 15, 2012, Demonoid reverted to its previous .me domain, but returned to the .ph domain a week later. The Demonoid website and tracker last went offline in July 2012 for a period of nearly two years, the longest hiatus ever. At the time it went offline, Demonoid was hosted by an ISP in Ukraine. Subsequent signs of activity led to no new developments until March 29, 2014, when the site, once again, went online. The revived site now uses a remote server.
On May 7, 2013, d2, an unofficial website based on Demonoid's databases went live at d2.vu, with hosting provided by the U.S.-based service RamNode. Around November 2013, a website showing the Demonoid logo and saying "We will rebuild!" came online at the .com domain, and the .me and .ph domains began redirecting web traffic to it, indicating they are all under control of the same owner. In January 2014, a tracker came online at the .com domain and provided service for the old torrents. On March 29, 2014, Demonoid came back online at the demonoid.ph domain. On December 3, 2014 domain name was changed to demonoid.pw.
On February 17, 2019 an official statement was made stating that ownership of demonoid.pw was lost and to avoid visiting it. In August 2019, Demonoid came back online at dnoid.to with registrations open intermittently.
On November 2, 2019, the website moved to the domain demonoid.is to distance itself from scams.
d2
During Demonoid's most recent downtime, an unofficial website based on Demonoid's databases was launched on May 7, 2013. The site went live at http://www.d2.vu/ with hosting provided by the U.S.-based service RamNode. d2's administrators stated, "No former admins have been involved with this rebranding or launch. This effort is independent and undertaken entirely for the benefit of the community."
Based on a Demonoid backup, d2 contained Demonoid's torrent and user databases. All previously registered Demonoid users were able to log in using their already existing Demonoid accounts, while new invite codes were being generated. Unlike Demonoid, d2 had no user forums, and to minimize legal risk, the site had no torrent tracker; all torrents instead used public trackers. RamNode eventually terminated d2's hosting and, in August 2013, d2.vu was hosted on a server in Sweden. d2 closed on March 30, 2014 when Demonoid went back up.
References
Internet properties established in 2003
BitTorrent websites
Internet properties disestablished in 2012
File sharing communities
Notorious markets
|
4662685
|
https://en.wikipedia.org/wiki/Think%20Blue%20Linux
|
Think Blue Linux
|
Think Blue Linux (sometimes ThinkBlue Linux) was a port of Linux to IBM S/390 (later, zSeries) mainframe computers, done by the Millenux subsidiary of German company Thinking Objects Software GmbH.
The distribution consisted primarily of a collection of Red Hat Linux 6.1 packages (or RPMs) on top of IBM's port of the Linux kernel. Distribution of the product is scheduled to cease in early 2006, as most of its packages are out of date, and other Linux distributions support IBM mainframes. Most modern Linux distributions support IBM mainframes, making a special dedicated distribution unnecessary.
References
LinuxToday article
Heise article (German)
External links
linux.s390.org aka linux.zseries.org is the official ThinkBlue/64 website
Thinking Objects Software GmbH (German)
Millenux (subsidiary of Thinking Objects) Linux for zSeries product page (German)
Discontinued Linux distributions
Linux distributions
|
2074517
|
https://en.wikipedia.org/wiki/List%20of%20Vanderbilt%20University%20people
|
List of Vanderbilt University people
|
This is a list of notable current and former faculty members, alumni (graduating and non-graduating) of Vanderbilt University in Nashville, Tennessee.
Unless otherwise noted, attendees listed graduated with bachelor's degrees. Names with an asterisk (*) graduated from Peabody College prior to its merger with Vanderbilt.
Notable alumni
Academia
Presidents and chancellors
Bob Agee (Ph.D) – 13th president of Oklahoma Baptist University
Will W. Alexander (B.Th 1912) – founding president of Dillard University
Niels-Erik Andreasen (Ph.D 1971) – 5th president of Andrews University
Roslyn Clark Artis (Ed.D. 2010) – 14th president of Benedict College
Robert G. Bottoms (Ph.D 1972) – 18th president of DePauw University
William Leroy Broun – 4th president of Auburn University
Robert Bruininks (M.A. 1965, Ph.D 1968) – 15th president of the University of Minnesota
Doak S. Campbell* (M.A. 1928, Ph.D 1930) – 1st president of Florida State University
Shirley Collado (B.A. 1994) – 9th president of Ithaca College
James C. Conwell (Ph.D. 1989) – 15th president of the Rose-Hulman Institute of Technology
Dennis Hargrove Cooke* (Ph.D. 1930) – 4th president of East Carolina University
Jesse Lee Cuninggim – 1st president of Scarritt College
Merrimon Cuninggim (B.A. 1931) – 15th president of Salem College
Herman Lee Donovan* (Ph.D 1928) – 4th president of the University of Kentucky
Sheldon Hackney (B.A. 1955) – 6th president of the University of Pennsylvania; chairman, National Endowment for the Humanities
Thomas K. Hearn (Ph.D 1965) – 12th president of Wake Forest University
E. Bruce Heilman (B.S. 1951, M.A. 1952) – 5th chancellor of the University of Richmond
Alfred Hume (Ph.D 1887) – 10th chancellor of the University of Mississippi
Z. T. Johnson* (Ph.D 1929) – 8th president of Asbury University
David C. Joyce (Ed.D. 1995) – 13th president of Brevard College
Robert L. King (J.D. 1971) – 7th chancellor of the State University of New York
Bradford Knapp (B.A. 1892) – 8th president of Auburn University
John Lowden Knight (M.A.) – 10th president of Nebraska Wesleyan University, 4th president of Baldwin-Wallace College
Michael K. Le Roy (Ph.D 1994) – 10th president of Calvin College
J. Bernard Machen (B.A. 1966) – 16th president of University of Utah, 11th president of University of Florida
The Rev. Edward Malloy (Ph.D 1975) – 16th president of the University of Notre Dame
Howard Justus McGinnis* (Ph.D 1927) – 3rd president of East Carolina University
Edward C. Merrill Jr. (Ph.D 1954)* – 4th president of Gallaudet University
Scott D. Miller (Ed.D. 1988) – 4th president of Virginia Wesleyan University
Charles N. Millican* (M.A. 1946) – founding president of the University of Central Florida
Niel Nielson (M.A., Ph.D) – 5th president of Covenant College
Fred Tom Mitchell* (M.A. 1927) – 10th president of Mississippi State University
Maryly Van Leer Peck (B.E. 1951) – 2nd president of Polk State College
J. Matthew Pinson (Ed.D.) – 5th president of Welch College
Griffith Thompson Pugh Sr. (Ph.D 1905) – former president of Columbia College
Edwin Richardson (B.S. 1900)* – 9th president of Louisiana Tech University
Kevin M. Ross (Ph.D 2006) – 5th president of Lynn University
Rubel Shelly (M.A., Ph.D) – 8th president of Rochester College
Henry N. Snyder (B.A. 1887) – 4th president of Wofford College
John J. Tigert (B.A. 1904) – Rhodes Scholar, 3rd president of University of Florida, 7th U.S. Commissioner of Education
William Troutt (Ph.D 1978) – 19th president of Rhodes College
Richard L. Wallace (Ph.D 1965) – 20th president of the University of Missouri
Toshimasa Yasukata (Ph.D 1985) – president of Hokkai Gakuen University
M. Norvel Young (M.A., Ph.D 1937) – 3rd president of Pepperdine University
James Fulton Zimmerman (B.A., M.A.) – 7th president of the University of New Mexico
Professors and scholars
Ali Abdullah Al-Daffa (Ph.D 1972) – Saudi mathematician; scholar at King Fahd University, King Saud University, Harvard University; founding fellow, Islamic Academy of Sciences
Erik K. Alexander – Professor of Medicine, Harvard Medical School; Co-chairman, International Guidelines on Thyroid Disease & Pregnancy
Robert Arrington (B.A. 1960) – American philosopher, Woodrow Wilson Fellow, Oxford Fellow
John Arthur (Ph.D 1973) – philosopher, professor at Binghamton University, Harvard University, fellow at the University of Oxford
Martha Bailey (Ph.D 2005) – Professor of Economics at UCLA, Executive Board of the American Economic Association
Jeff Balser (M.D./Ph.D 1990) – President and CEO of Vanderbilt University Medical Center and Dean of the Vanderbilt University School of Medicine
Faisal Basri (M.A. 1988) – Indonesian economist specializing in political economics
Randolph Blake (Ph.D 1972) – Centennial Professor of Psychology at Vanderbilt, former faculty at Northwestern University and Seoul National University, National Academy of Sciences
Dan Blazer (B.A. 1965) – J.P. Gibbons Professor of Psychiatry emeritus at Duke University School of Medicine
Cleanth Brooks (B.A. 1928) – literary critic and Professor of English at Yale University
L. Carl Brown (B.A. 1950) – emeritus professor of history at Princeton University, Guggenheim Fellow
Markus Brunnermeier (M.A. 1994) – economist, Edwards S. Sanford professorship at Princeton University, Guggenheim Fellow
Anthea Butler (M.A., Ph.D 2001) – Geraldine R. Segal Professor in American Social Thought at the University of Pennsylvania
Sheryll Cashin (B.E. 1984) – law scholar, political adviser, professor at Georgetown University Law Center
Kathleen R. Cho (M.D. 1984) – Professor of Pathology and Internal Medicine at Michigan Medicine, National Academy of Medicine
Ellen Cohn (M.S. 1975) – Associate Dean and professor at University of Pittsburgh School of Health and Rehabilitation Sciences
Ed Connor (M.S. 1982) – key figure in the neuroscience of object synthesis in higher-level visual cortex, Professor of Neuroscience at Johns Hopkins University
Herman Daly (Ph.D) – ecological and Georgist economist, developed the Index of Sustainable Economic Welfare, Right Livelihood Award winner
John Emmeus Davis (B.A. 1971) – scholar who has advanced the understanding of community land trusts, taught at Tufts University and the Massachusetts Institute of Technology
Tania Douglas (M.S. 1995) – professor of biomedical engineering, Research Chair of Biomedical Engineering and Innovation at the University of Cape Town, Quartz Africa Innovators (2018)
Larry Druffel (Ph.D 1975) – director emeritus and visiting scientist at the Software Engineering Institute (SEI) at Carnegie Mellon University, Fellow of the IEEE
William Yandell Elliott (B.A. 1917, M.A. 1920) – Rhodes Scholar, professor of history at University of California, Berkeley and Harvard University
Sarah K. England (Postdoc) – Alan A. and Edith L. Wolff Professor of Obstetrics and Gynaecology at Washington University in St. Louis, Robert Wood Johnson Foundation Fellow
George T. Flom (M.A. 1894) – professor of linguistics and author of numerous reference books, knighted by 1 Class of the Royal Norwegian Order of St. Olav (1939)
Kenneth Galloway (B.A. 1962) – American engineer, Distinguished Professor of Engineering, Dean of the School of Engineering, Emeritus, Vanderbilt University
John Gaventa, (B.A. 1971) – sociologist, Rhodes Scholar, MacArthur Fellow (1981), Officer of the Order of the British Empire
Cullen B. Gosnell (M.A. 1920), founder and former chair of the department of political science at Emory University
Antonio Gotto (B.A. 1957, M.D. 1965) – Dean of Cornell University Weill Medical College, Rhodes Scholar
Edward C. Green – American medical anthropologist, Presidential Advisory Council on HIV/AIDS, Senior Research Scientist at the Harvard School of Public Health
Roger Groot (B.A. 1963) – Class of 1975 Alumni Professor of Law at Washington and Lee University School of Law, expert in criminal law and the death penalty
F. Peter Guengerich (Ph.D 1973) – Tadashi Inagami Chair in Biochemistry at the Vanderbilt University School of Medicine
Herbert Gursky (M.S. 1953) – superintendent, NRL's Space Science Div., Chief Scientist, Hulburt Center for Space Research, Professor of Physics and Astronomy at Harvard, Princeton, and Columbia University
J. Alex Haller (B.A. 1947) – first Robert Garrett Professor of Pediatric Surgery at the Johns Hopkins School of Medicine, co-creator and namesake of the Haller index
Helen Hardacre (B.A. 1971, M.A. 1972) – Reischauer Institute Professor of Japanese Religions and Society, Harvard University; Guggenheim Fellow; Order of the Rising Sun, Japan (2018)
Louis R. Harlan (M.S. 1948) – academic historian, winner of the 1984 Pulitzer Prize for Biography or Autobiography
David Edwin Harrell (Ph.D 1962) – historian at Auburn University, emeritus professor and Breeden Eminent Scholar of Southern History
John Heil (Ph.D) – Professor of Philosophy at the Washington University in St Louis, Guggenheim Fellow (2018)
Alfred O. Hero Jr. (M.A. 1950) – American political scientist; editor, International Organization; visiting professor, University of Toronto; visiting scholar, Harvard University
Dorothy M. Horstmann (med. resident) – epidemiologist and virologist whose research helped set the stage for the polio vaccine, first female professor of the Yale School of Medicine
Kung Hsiang-fu (Ph.D 1969) – Chinese geneticist and oncologist, former director of the University of Hong Kong's Institute of Molecular Biology, Chinese Academy of Sciences
G. Scott Hubbard (B.S. 1970) – former director of NASA's Ames Research Center, chairman SpaceX Safety Advisory Panel, adjunct professor Stanford University
Paul Hudak (B.S. 1973) – Professor and Chair of the Department of Computer Science, Yale University, best known for his involvement in the design of the Haskell programming language
Richard Hurd (Ph.D) – Professor of Industrial and Labor Relations; ILR Associate Dean for External Relations, Cornell University School of Industrial and Labor Relations
Thomas Huynh (E.M.B.A. 2004) – Vietnamese author, translator, and scholar of the Chinese classic Sun Tzu's The Art of War
Mainul Islam (Ph.D 1981) – Bangladeshi economist and academician, awarded Ekushey Padak by the Government of Bangladesh in 2018
George Pullen Jackson (B.A. 1902) – Professor of German at Vanderbilt University
Alexander D. Johnson (B.A. 1974) – professor and vice chair of the department of microbiology and immunology at the University of California, San Francisco
Joseph A. Kéchichian – Lebanese author and political scientist, Hoover Fellow at Stanford University, former lecturer at the University of California in Los Angeles
Edwin A. Keeble (B.E. 1924) – American architect trained in the Beaux-Arts tradition, known for tall slender church steeples, nicknamed "Keeble's needles," taught at the University of Pennsylvania
David Kirk (B.A. 1996) – sociologist; Associate Professor of Sociology, University of Oxford; departmental director of research
J. Davy Kirkpatrick (B.S. 1986) – American astronomer at the Infrared Processing and Analysis Center at the California Institute of Technology whose research was named one of the Top 100 Stories of 2011 by Discover Magazine
Thomas Kolditz (B.A. 1978) – former director, Leader Development Program at the Yale School of Management; founding director, Doerr Institute at Rice University
Leah Krubitzer (Ph.D 1989) – Professor of Psychology at University of California, Davis, and head of the Laboratory of Evolutionary Neurobiology, MacArthur Fellow (1998)
Frances E. Lee (Ph.D 1997) – Professor of Politics and Public Affairs, Princeton University; co-editor of Legislative Studies Quarterly
Peter Mancina (Ph.D 2016) – Research Associate at the Centre for Criminology, Law Faculty of the University of Oxford
Tom Maniatis (Ph.D 1971) – professor of molecular and cellular biology, held faculty positions at Harvard University, the California Institute of Technology, and Columbia University, Lasker Award winner (2001)
Henry Manne (B.A. 1950) – American writer and academic, considered a founder of the law and economics discipline
Jacques Marcovitch (M.M. 1972) – Brazilian emeritus Professor at the Business Administration, Economy and Accountancy Faculty, University of São Paulo
Donald B. McCormick (B.S. 1953, Ph.D. 1958) – biochemist; professor, Cornell University; chair of biochemistry, Emory University; Guggenheim Fellow
Glenn McGee (M.A. 1991, Ph.D 1994) – bioethicist; founding editor of the American Journal of Bioethics; associate director of UPenn Bioethics, 1995–2005
Timothy J. McGrew (M.A. 1991, Ph.D 1992) – professor of philosophy, and chair of the department of philosophy at Western Michigan University
Neil R. McMillen (Ph.D 1969) – professor emeritus at the University of Southern Mississippi, Bancroft Prize winner (1990), Pulitzer Prize finalist (1990)
H. Houston Merritt (B.S. 1922) – former Harvard University faculty, former Dean of the Vagelos College of Physicians and Surgeons at Columbia University
Edwin Mims (B.A. 1892, M.A. 1893) – chair of the Vanderbilt University English Department (1912–1942), taught many members of the Fugitives and the Southern Agrarians
Merrill Moore (B.A. 1924) – Ericksonian psychologist, poet, taught neurology at Harvard Medical School, Research Fellow of the Harvard Psychological Clinic
David Morton (B.A. 1909) – American poet, Golden Rose Award winner, faculty at Amherst College
Pieter Mosterman (Ph.D 1997) – Chief Research Scientist, director of the MathWorks Advanced Research & Technology Office (MARTO), adjunct professor at McGill University
Michael Ndurumo (B.S., M.S., Ph.D) – Kenyan Professor of Psychology at the University of Nairobi, Kenya, activist for special education in Africa
Mark Noll (Ph.D 1975) – historian, Research Professor of History at Regent College, previously Francis A. McAnaney Professor of History at the University of Notre Dame
Michael O'Brien – British historian, Professor of American Intellectual History at the University of Cambridge
Efosa Ojomo (B.E. 2005) – Global Prosperity Lead, Clayton Christensen Institute, Senior Research Fellow, Harvard Business School
Kit Parker (Ph.D 1998) – Tarr Family Professor of Bioengineering and Applied Physics at Harvard University, research includes tissue engineering, traumatic brain injury, micro- and nanotechnologies
Don K. Price (B.A. 1931) – founding dean of Harvard University's John F. Kennedy School of Government (1958–1976), Rhodes Scholar
Bill Purcell (J.D. 1979) – former director of the Institute of Politics (IOP) at Harvard University's John F. Kennedy School of Government
Stuart C. Ray (M.D. 1990) – Vice Chair of Medicine for Data Integrity and Analytics, associate director of the Infectious Diseases Fellowship Training Program at the Johns Hopkins School of Medicine
J. Fred Rippy (M.A. 1915) – historian of Latin American and American diplomacy, Professor of History at the University of Chicago and Duke University, Guggenheim Fellow
Marylyn D. Ritchie (M.S. 2002, Ph.D 2004) – Professor of Genetics; Director, Center for Translational Bioinformatics at the University of Pennsylvania
Tom Rockmore (Ph.D 1974) – Distinguished Humanities Chair, professor at Peking University, China
Leland Sage (B.A. 1922) – American historian, professor emeritus of history at the University of Northern Iowa
Elyn Saks (B.A. 1977) – associate dean and professor of law at the University of Southern California; scholar of mental health law; MacArthur Fellow (2009)
Roberto Castillo Sandoval (M.A. 1985) – Chilean author and Professor of Comparative Literature and Latin American Studies at Haverford College
Edward Schumacher-Matos (B.A. 1968) – director, Edward R. Murrow Center, Tufts University, former faculty, Columbia University School of Journalism, former director, migration studies, Harvard University
James K. Sebenius (B.A. 1975) – American economist, Gordon Donaldson Professor of Business administration at Harvard Business School
Artyom Shneyerov (M.A. 1997) – microeconomist at Concordia University in Montreal, Quebec, Canada
Debora Shuger (B.A. 1975, M.A. 1978, M.A.T. 1978) – Distinguished Professor of English at UCLA, contributor to the Cambridge History of Early Modern English Literature, Guggenheim Fellow
Lee Sigelman (Ph.D 1973), American political scientist, former editor-in-chief of the American Political Science Review
Evgenia Smirni (Ph.D. 1995) – Sidney P. Chockley Professor of Computer Science at the College of William & Mary, IEEE Fellow
D.M. Smith (B.A. 1908, M.A. 1910) – mathematician and professor at the Georgia Institute of Technology, charter member of the American Mathematical Society
James Perrin Smith (M.A. 1887) – early scholar of Mesozoic rock formations, Professor of Geology and Paleontology at Stanford University, Mary Clark Thompson Medal winner, National Academy of Sciences
Erica Spatz (B.S. 1997) – Associate Professor, clinical investigator at the Center for Outcomes Research and Evaluation, Yale University School of Medicine
Mildred T. Stahlman (B.A. 1943, M.D. 1946) – professor of pediatrics and pathology at Vanderbilt, started the first newborn intensive care unit in the world, John Howland Award winner
David Stuart (Ph.D 1995) – archaeologist/epigrapher, MacArthur Fellow at age 18, former curator of Maya Hieroglyphs and senior lecturer at Harvard University, Schele Professor of Mesoamerican Art and Writing at UT Austin
John J. Stuhr (M.A., Ph.D 1976) – Distinguished Professor of Philosophy and American Studies at Emory University, coined genealogical pragmatism
Mriganka Sur (M.S. 1975, Ph.D 1978) – Newton Professor of Neuroscience, Simons Center for the Social Brain Director, investigator at the Picower Institute for Learning and Memory at MIT
James R. Thompson (B.S. 1960) – former chair of the department of statistics and Noah Harding Emeritus Professor of Statistics at Rice University
Antonio D. Tillis (B.S. 1987) – Dean, College of Charleston; chair, Latin American Studies, Purdue University; chair, African and African-American Studies, Dartmouth College
Richard D. Todd (B.S.) – former Blanche F. Ittleson Professor of Psychiatry and director, Child and Adolescent Psychiatry at Washington University in St. Louis
Victor J. Torres (Ph.D 2004) – C.V. Starr Professor of Microbiology, New York University School of Medicine; director, Anti-Microbial Resistant Pathogens Program; MacArthur Fellow (2021)
Thomas J. Trebat (Ph.D) – American economist and political scientist who teaches at the School of International and Public Affairs at Columbia University, member of the Council on Foreign Relations
James C. Tsai (M.B.A. 1998) – former Robert R. Young Professor of Ophthalmology and Visual Science and chair, Department of Ophthalmology, Yale University School of Medicine
David Tzuriel (Ph.D 1977) – Israeli psychologist, professor and chairman of the School of Education at Bar Ilan University
Richard M. Weaver (M.A. 1934) – Platonist philosopher, author, scholar, and authority on modern rhetoric, Professor of English at the University of Chicago
Emil Carl Wilm (M.A. 1903) – Prussian-American philosopher, professor at Washburn College, Harvard University, Boston University, and Stanford University
John Long Wilson (B.A. 1935) – medical professor and administrator at American University of Beirut, Lebanon, and Stanford University
Sheldon M. Wolff (M.D. 1957) – former chair of the Department of Medicine at Tufts University School of Medicine
Minky Worden (B.A. 1989) – human rights advocate and author, director of Global Initiatives at Human Rights Watch, professor at Columbia University's School of International and Social Affairs
Thomas Daniel Young (Ph.D 1950) – first Gertrude C. Vanderbilt Professor of English at Vanderbilt
Art, literature, and humanities
Alev Alatlı (M.A. 1965) – Turkish economist, philosopher, columnist and bestselling novelist
Thomas B. Allen – American expressionist painter and illustrator, pioneer of visual journalism
Alfred Bartles – composer of "Music for Symphony Orchestra and Jazz Ensemble"
Richmond C. Beatty (M.A. 1928, Ph.D 1930) – biographer and critic, Guggenheim Fellow
Lynne Berry (Ph.D. 1997) – American writer and poet
Diann Blakely (M.A. 1980) – American poet
Campbell Bonner (B.A. 1896, M.A. 1897) – American classicist
Jack Boone (B.A., M.A., Ph.D.) – American writer, O. Henry Award Winner (1932)
William Brittelle (B.M. 1999) – electro-acoustic composer
Cleanth Brooks (B.A. 1928) – founder of New Criticism, The Well Wrought Urn (1947)
Marshall Chapman (B.A. 1971) – singer-songwriter, author
Brainard Cheney – novelist, playwright and essayist, member of the Southern Agrarians
Mel Chin (B.A. 1975) – conceptual visual artist, MacArthur Fellow (2019)
Tiana Clark (M.F.A. 2017) – American poet
Clyde Connell – American abstract expressionist sculptor
Alfred Leland Crabb (B.A. Peabody) – American author of historical fiction
Bruce Crabtree – American architect
Francis Craig – American songwriter, including Vanderbilt fight song "Dynamite" (1922)
Compton Newby Crook* (B.A. 1929) – American science fiction writer, Hugo Award winner, namesake of the Compton Crook Award
David Dark (Ph.D 2011) – American writer
Donald Davidson (B.A. 1917, M.A. 1922) – novelist, poet, and opera librettist
Ky Dickens (B.A. 2000) – filmmaker and writer, best known for her 2009 documentary Fish out of Water
James Dickey (B.A. 1949) – author and poet, winner of the National Book Award for Poetry, author of the novel Deliverance
Julia Lester Dillon* (B.A. 1890) – landscape architect, inscribed upon the Georgia Women of Achievement in 2003
Marjorie K. Eastman (M.B.A.) – author of The Frontline Generation, 2017 Independent Publishers National Book Award winner
Ruth Denson Edwards* (B.A. 1913) – American hymnwriter and figure in the Sacred Harp movement
William Eggleston – American photographer
Francis Perry Elliott – novelist known for screen adaptions The Square Deceiver (1917) and Pals First (1926)
Karen Essex (M.F.A 1999) – American historical novelist known for Leonardo's Swans and Stealing Athena
Jesse Hill Ford (B.A. 1951) – writer of Southern Literature
Frances Fowler – American painter
Ellen Gilchrist – National Book Award-winning author
Red Grooms – multimedia artist most associated with pop art
Kelsie B. Harder (B.A. 1950, M.A. 1951) – onomastician
Costen Jordan Harrell (M.A. 1910) – writer and bishop of The Methodist Church
William Harrison (M.A. 1959) – American novelist, short story writer, and screenwriter, Burton and Speke, Rollerball, Guggenheim Fellow (1973)
Eric L. Harry (BA 1980, MBA 1983, JD 1984) – American author best known for his novels Arc Light and Invasion
Ross Hassig (M.A. 1974) – anthropologist, author, Mesoamerica scholar
Sylvia Hyman* (M.A. 1963) – American sculptor and ceramic artist
William Inge (Peabody, 1935) – Pulitzer Prize-winning playwright, best known for Picnic
Michelle Izmaylov (M.D.) – bestselling writer of fantasy-fiction books
George Pullen Jackson (B.A. 1902) – American musicologist, pioneer in the field of Southern American hymnody
Randall Jarrell (M.A. 1938) – United States Poet Laureate
Madison Jones (B.A. 1949) – novelist, member of the Southern Agrarians
Donika Kelly (M.A. 2009) – American poet, winner of the 2015 Cave Canem prize
Mark Kendall (B.A. 2005, M.A. 2008) – American artist and filmmaker, La Camioneta (2012), Guggenheim Fellow
Matthew Washington Kennedy* (Ph.D.) – American classical pianist and composer
Mark Thomas Ketterson (B.A. 1976) – performing arts journalist and critic Opera News
Perry Lentz (M.A. 1966, Ph.D 1970) – author, Woodrow Wilson Fellow and Rockefeller Foundation grant holder
Alan LeQuire (B.A. 1978) – American sculptor
Andrew Nelson Lytle (B.A. 1925) – novelist and professor
Evan Mack (B.M. 2003) – composer, librettist and pianist
Ellis K. Meacham (LL.B 1937) – authored a Napoleonic era nautical adventure trilogy published by Little, Brown (US) and Hodder & Stoughton (UK)
Greg Miller (B.A. 1979) – poet
Jim Wayne Miller (Ph.D 1965) – American Appalachian poet
Merrill Moore (B.A. 1924) – poet
W. R. Moses (Ph.D) – American poet
Adrienne Outlaw – sculptor
Edd Winfield Parks (Ph.D 1929) – American writer and essayist
H. Clinton Parrent Jr. – American architect
James Patterson (M.A. 1970) – bestselling contemporary writer of thrillers
Jon Parrish Peede (B.A.) – former Chairman of the National Endowment for the Humanities
John Crowe Ransom (B.A. 1909) – poet and essayist, founder of New Criticism, Rhodes Scholar
Fahmi Reza – Malaysian political street artist and documentarian
Graham Robb FRSL (Ph.D 1986) – British author, The Discovery of France, Chevalier of the Ordre des Arts et des Lettres
Kaira Rouda (B.A. 1985) – American novelist
Daniel Bernard Roumain (B.M 1993) – composer, performer, violinist, and band-leader
David P. Sartor – composer and conductor
Steven D. Schroeder (B.A.) – American poet
Tom Schulman (B.A. 1972) – Academy Award-winning screenwriter of the film Dead Poets Society
Jeanne Ellison Shaffer (Ph.D 1970) – American composer
Beasley Smith – American composer and big band musician
Samuel L. Smith* (M.A. 1918) – American practical architect
Elizabeth Spencer (M.A. 1943) – writer of the novella The Light in the Piazza
Laura Spong (B.A. 1948) – Abstract expressionist painter
James Still (M.A. 1930) – American poet, novelist and folklorist, best known for the novel River of Earth (1940)
Georgia Stitt (B.M 1994) – American composer and lyricist, arranger, conductor, and musical director
H.R. Stoneback (Ph.D 1970) – American academic, poet, and folk singer, Hemingway, Durrell, and Faulkner scholar
Jesse Stuart – American writer, Guggenheim Fellow
Amy H. Sturgis (Ph.D) – author, speaker and scholar of science fiction/fantasy studies and Native American studies
Walter Sullivan (B.A. 1947) – southern novelist and literary critic, founding charter member of the Fellowship of Southern Writers
Allen Tate (B.A. 1922) – United States Poet Laureate
Eleanor Ross Taylor – American poet, 2010 Ruth Lilly Poetry Prize
Peter Taylor – novelist, short story writer, and playwright, 1987 Pulitzer Prize for Fiction
Nafissa Thompson-Spires (M.A. 2005, Ph.D. 2009) – American writer, 2019 Whiting Award
Pat Toomay – NFL defensive end, author of Any Given Sunday, basis for Oliver Stone's eponymous film (1999)
William Trowbridge (Ph.D 1975) – American poet, Academy of American Poets Prize
Robert Turner (M.A. 1950) – Canadian composer, appointed Order of Canada in 2002
Robert Penn Warren (B.A. 1925) – Pulitzer Prize winner, United States Poet Laureate, author of All the King's Men (1946)
Geoffrey R. Waters (B.A.) – poet and translator, Willis Barnstone Translation Prize
Sarah Webb – Contemporary realist painter
James Whitehead (B.A., M.A.) – poet, 1972 Guggenheim Fellow
Ralph Wickiser* (M.A. 1935, Ph.D 1938) – American painter
Greg Williamson – poet, known for the invention of the "Double Exposure" form in which one poem can be read three different ways
Martin Wilson (B.A. 1995) – writer best known for his award-winning debut novel What They Always Tell Us
Terri Witek (B.S. 1983, M.A. 1984, Ph.D 1988) – poet, Slope Editions Prize, Center for Book Arts Prize Winner
Kat Zhang (B.A. 2013) – American science-fiction novelist, What's Left of Me (2012)
Athletics
Baseball
Pedro Alvarez – infielder, Pittsburgh Pirates (2010–15), Baltimore Orioles (2016–18)
Mike Baxter – outfielder, San Diego Padres (2010), New York Mets (2011–13), Los Angeles Dodgers (2014), Chicago Cubs (2015)
Tyler Beede – pitcher, San Francisco Giants (2018–present)
Walker Buehler – pitcher, Los Angeles Dodgers (2017–present); All-Star (2019)
Vin Campbell – outfielder, Chicago Cubs (1908), Pittsburgh Pirates (1910–11), Boston Braves (1912), Indianapolis Hoosiers (1914), and Newark Peppers (1915)
Curt Casali – catcher, Tampa Bay Rays (2014–17), Cincinnati Reds (2018), San Francisco Giants (present)
Wilson Collins – outfielder, Boston Braves (1913-1914)
Doc Cook – outfielder, New York Yankees (1913-1916)
Joey Cora – second baseman, Cleveland Indians (1998); Seattle Mariners (1995–98/ All-Star 1997); Chicago White Sox (1991–94); San Diego Padres (1987, 1989–90)
Caleb Cotham – pitcher, New York Yankees (2015), Cincinnati Reds (2016)
Slim Embry – starting pitcher, Chicago White Sox (1923)
Ryan Flaherty – infielder, Baltimore Orioles (2012–17), Atlanta Braves (2018), Cleveland Indians (2019); coach, San Diego Padres (2020–present)
Carson Fulmer – pitcher, Chicago White Sox (2016–present)
Sonny Gray – pitcher, Oakland Athletics (2013–17), New York Yankees (2017–18), Cincinnati Reds (2019–present); All-Star (2015, 2019)
Harvey Hendrick – New York Yankees (1923–24), Cleveland Indians (1925), Brooklyn Robins (1927–31), Cincinnati Reds (1931–32), St. Louis Cardinals (1932), Chicago Cubs (1933), Philadelphia Phillies (1934)
Matt Kata – infielder, Arizona Diamondbacks (2003–05), Philadelphia Phillies (2005), Texas Rangers, Pittsburgh Pirates (2007), Houston Astros (2009)
Tony Kemp – second baseman, outfielder, Houston Astros (2016–19), Chicago Cubs (2019), Oakland Athletics (2020–present)
Jensen Lewis – broadcaster; pitcher, Cleveland Indians (2005–11), Arizona Diamondbacks (2012), Chicago Cubs (2013); Roberto Clemente Award nominee (2010)
Scotti Madison – third baseman, Detroit Tigers (1985–86), Kansas City Royals (1987–88), Cincinnati Reds (1989)
Austin Martin – shortstop, Toronto Blue Jays (2020–present)
Mike Minor – starting pitcher, Atlanta Braves (2010–14), Kansas City Royals (2017), Texas Rangers (2018–20), Oakland Athletics (2020–present); All-Star (2019)
Scrappy Moore – third baseman, St. Louis Browns (1917)
Penn Murfee – pitcher, United States national baseball team, 2019 WBSC Premier12
Josh Paul – catcher, Arizona Diamondbacks (2003–05), Philadelphia Phillies (2005), Texas Rangers (2007), Pittsburgh Pirates (2007), Houston Astros (2009)
David Price – starting pitcher, Los Angeles Dodgers; All-Star (2010–12, 2014, 2015), Cy Young Award (2012), World Series champion (2018)
Andy Reese – infielder/outfielder, New York Giants (1927–30)
Bryan Reynolds – outfielder, Pittsburgh Pirates (2019–present)
Antoan Richardson – outfielder, Atlanta Braves (2011), New York Yankees (2014); first base coach, San Francisco Giants (2020–present)
Scott Sanderson – Montreal Expos, Chicago Cubs, Oakland Athletics, New York Yankees, California Angels, San Francisco Giants, Chicago White Sox, California Angels (1978–96); All-Star (1991)
Sam Selman – pitcher, San Francisco Giants (2019–present)
Rip Sewell – starting pitcher, Detroit Tigers (1932), Pittsburgh Pirates (1938–1949); 4× All-Star (1943–1946)
Justus Sheffield – pitcher, New York Yankees (2018), Seattle Mariners (2019–present)
Jeremy Sowers – pitcher, Cleveland Indians (2006–09); executive, Tampa Bay Rays (2020–present)
Dansby Swanson – shortstop, Atlanta Braves (2016–present); Haarlem Baseball Week Gold (2014)
Drew VerHagen – pitcher, Detroit Tigers (2014–19), Hokkaido Nippon-Ham Fighters (2020–present)
Casey Weathers – pitcher, Colorado Rockies (2007–10), Chicago Cubs (2011-12); Bronze Medal, 2008 Summer Olympics
Mike Willis – pitcher, Toronto Blue Jays (1977–81)
Rhett Wiseman – outfielder, Washington Nationals (Minor League); Team Israel, World Baseball Classic (2017)
Kyle Wright – pitcher, Atlanta Braves (2018–present)
Mike Yastrzemski – outfielder, San Francisco Giants (2019–present); Willie Mac Award (2020)
Josh Zeid – pitcher, Houston Astros (2013–14); Team Israel, World Baseball Classic (2017)
Basketball
Chantelle Anderson – women's basketball (1999–2003); Sacramento Monarchs (2003–04), San Antonio Silver Stars (2005–07)
Wade Baldwin IV – men's basketball (2014–16); Memphis Grizzlies (2016-17), Portland Trail Blazers (2017–19)
Rhonda Blades – women's basketball (1991–95); New York Liberty (1997), Detroit Shock (1998)
Derrick Byars – men's basketball (2005–07); SEC Player of the Year (2007); Chicago Bulls (2010), San Antonio Spurs (2012)
Charles Davis – men's basketball (1976–81); Washington Bullets (1981-84), Milwaukee Bucks (1984–87), San Antonio Spurs (1987), Chicago Bulls (1988–90)
Festus Ezeli – men's basketball (2008–12); Golden State Warriors (2012-16), Portland Trail Blazers (2016–17), NBA Champion (2015)
Mariella Fasoula – women's basketball (2018–20); Greek national team
Butch Feher – men's basketball (1972–76); Phoenix Suns (1976-77)
Johnny "Red" Floyd – football and basketball (1915–16, 1919–20); namesake of Johnny "Red" Floyd Stadium
Jeff Fosnes – men's basketball (1972–1976); 1st Academic All-American; fourth-round draft pick, Golden State Warriors (1976)
Shan Foster – men's basketball (2005–08); second team Associated Press All-American; 2008 SEC Player of the Year
Rod Freeman – men's basketball (1970–73); Philadelphia 76ers (1973-74)
Matt Freije – men's basketball (2000–04); New Orleans Hornets (2004-05), Atlanta Hawks (2006)
Ronald Green (1944–2012) – American-Israeli men's basketball player
John Jenkins – men's basketball (2009–12); All-SEC (2011, 2012); Atlanta Hawks (2012–15), Dallas Mavericks (2015-16), Phoenix Suns (2016–17), New York Knicks (2019)
Damian Jones – men's basketball (2013–16); Golden State Warriors (2016-19), Atlanta Hawks (2019–present); NBA Champion (2017, 2018)
Hutch Jones – men's basketball (1979–82); San Diego Clippers (1982-83)
Zuzana Klimešová – women's basketball (2001); Czech former basketball player, Olympian in the 2004 Summer Olympics
Frank Kornet – men's basketball (1985–89); Milwaukee Bucks (1989-91)
Luke Kornet – men's basketball (2013–17); New York Knicks (2017-19), Chicago Bulls (2019–present)
Dan Langhi – men's basketball (1996–2000); Houston Rockets (2000–02), Phoenix Suns (2002–03), Golden State Warriors (2003), Milwaukee Bucks (2003)
Clyde Lee – men's basketball (1963–66); SEC Player of the Year (1966), All-American (1966); San Francisco/Golden State Warriors (1966–74), Atlanta Hawks (1975), Philadelphia 76ers (1975–76)
Matt Maloney – men's basketball (1990–91); Houston Rockets (1996–99), Chicago Bulls (2000), Atlanta Hawks (2000–03)
Billy McCaffrey – men's basketball (1991–93); two-time All-American; SEC Player of the Year (1993)
Aaron Nesmith – men's basketball (2018–20); Boston Celtics (2020–present)
Will Perdue – men's basketball (1983–88); Chicago Bulls (1988–95), San Antonio Spurs (1995–99), Portland Trail Blazers (2000–01), 4× NBA Champion (1991–1993, 1999)
Sheri Sam – women's basketball (1992–96); WNBA Charlotte Sting (2005–06), Seattle Storm (2004), Minnesota Lynx (2003), Miami Sol (2000–02), Orlando Miracle (1999)
Simisola Shittu (born 1999) - men's basketball; British-born Canadian basketball player for Ironi Ness Ziona of the Israeli Basketball Premier League
Jeffery Taylor – men's basketball (2008–12); Charlotte Hornets (2012-15), Real Madrid (2015–present), EuroLeague Champion (2018)
Carla Thomas – women's basketball (2003–07); Chicago Sky (2007)
Jeff Turner – men's basketball (1980–84); New Jersey Nets (1984-87); Gold Medalist at the 1984 Summer Olympics
Jan van Breda Kolff – men's basketball (1971–74); SEC Player of the Year (1974); Denver Nuggets (1974–75), New York / New Jersey Nets (1976-83)
Perry Wallace – men's basketball (1967–70); first African-American basketball player in the SEC; U.S. Department of Justice attorney; Professor of Law, American University (1993-2017)
Football
Bob Asher – offensive tackle (1967–69); Dallas Cowboys (1970–71), Chicago Bears (1972–75), Super Bowl VI Champion
Earl Bennett – wide receiver (2005–08); 3× All-SEC (2005–06), Cleveland Browns (2008-14), Chicago Bears (2014)
Lynn Bomar – end (1921–24); New York Giants (1925–26); College Football Hall of Fame (1956)
Mack Brown – running back (1969–70); head coach, University of Texas (1998-2013), University of North Carolina (1988–97, 2019- )
Watson Brown – quarterback (1969–72); head coach, Austin Peay (1979–80), Cincinnati (1983), Rice (1984–85), Vanderbilt (1986–90), UAB (1995–2006), Tennessee Tech (2007– )
Corey Chavous – safety (1994–98); Arizona Cardinals (1998–2001), Minnesota Vikings (2002–05), St. Louis Rams (2006–08)
Josh Cody – tackle (1914–1916, 1919); 3× All-American, College Football Hall of Fame (1970)
David Culley – quarterback (1974-1977); head coach, Houston Texans (2021– )
Zach Cunningham – linebacker (2014–16); First-team All-American (2016); Houston Texans (2017– )
Bucky Curtis – defensive back (1947–1950); Cleveland Browns (1951), Toronto Argonauts (1955–56); All-American (1950)
Jay Cutler – quarterback (2002–05); Denver Broncos (2006–09), Chicago Bears (2009–16), Miami Dolphins (2017); "100 Greatest Bears of All-Time"
Art Demmas – linebacker (1952–56), captain (1956); NFL Official (1970–96)
Jamie Duncan – linebacker (1995–97), All-American (1997); Tampa Bay Buccaneers (1998–2001), St. Louis Rams (2002–03), Atlanta Falcons (2004)
Ewing Y. Freeland – tackle (1909–12); head coach, SMU (1922–23), Texas Tech (1925-28), Austin College (1936–38)
Jonathan Goff – linebacker (2005–07); New York Giants (2008–11); Super Bowl XLVI Champion
Clarence "Pete" Gracey – center (1930–32); All-American (1932)
Corey Harris – safety (1988–91); Green Bay Packers (1992–94), Seattle Seahawks (1995–96), Miami Dolphins (1997), Baltimore Ravens (1998–2001), Detroit Lions (2002–03)
Casey Hayward – cornerback (2008–11); Green Bay Packers (2012–15), Los Angeles Chargers (2016– ); 2× Pro Bowl (2016, 2017); NFL interceptions leader (2016)
Hunter Hillenmeyer – linebacker (1999–2002); Chicago Bears (2003–10); NFC Champion (2006)
Carl Hinkle – center (1935–37), Southeastern Conference MVP (1937), College Football Hall of Fame (1959)
Elliott Jones – fullback (1890–92); captain (1890–92)
W. J. "Cap" Keller – quarterback (1893–94); captain (1893–1894)
Everett "Tuck" Kelly – guard (1922–24); All-Southern (1923), captain (1924)
Oliver "Doc" Kuhn – quarterback (1920–1923); captain (1923); Porter Cup (1923)
Frank Kyle – quarterback (1902–05); head coach, Ole Miss (1908)
Clark Lea – fullback (2002–04); defensive coordinator for Notre Dame (2018–20), head coach for Vanderbilt (2021– )
David Lee – quarterback (1971–75); captain (1974); head coach, University of Texas at El Paso (1989–93), NFL quarterback coach (2003– )
Allama Matthews – wide receiver (1979–82), Atlanta Falcons (1983–85)
D. J. Moore – cornerback (2006–08); Chicago Bears (2009–2012), Carolina Panthers (2013), Tampa Bay Buccaneers (2014)
Jess Neely – halfback (1920–22); captain (1922); head coach, Rice University (1940–67), Vanderbilt athletic director (1967–71, 1973)
Dick Plasman – end and captain (1936), Chicago Bears (1937–41, 1944), Chicago Cardinals (1946–47), 3× NFL Champion, last NFL player to play without a helmet
Shelton Quarles – middle linebacker (1990–93); Tampa Bay Buccaneers (1997–2006); Super Bowl XXXVII Champion
Tom Redmond – defensive tackle (1955–58); St. Louis Cardinals (1960-65)
Herb Rich – safety (1946–49); Baltimore Colts (1950), Los Angeles Rams (1951–53), New York Giants (1954-56)
Bob Rives – tackle (1923–25); All-Southern (1924–1925); Newark Bears (1926)
Bo Rowland – end (1923–24); head coach, Henderson-Brown (1925–30), The Citadel (1940-42), Oklahoma City (1946–47), George Washington (1948-51)
Justin Skule – offensive tackle (2015-2019); San Francisco 49ers (2019– )
Rupert Smith – halfback, quarterback (1921); SIAA Champion (1921)
Bill Spears – quarterback (1925–27); College Football Hall of Fame (1962)
Matt Stewart – linebacker (1997–2000); Atlanta Falcons (2001–04), Cleveland Browns (2005–07)
Whit Taylor – quarterback (1979–1982); ArenaBowl I Champion (1987), SEC Football Legend (2003)
Ke'Shawn Vaughn – running back (2017–19); SEC Newcomer of the Year (2018); Tampa Bay Buccaneers (2020– )
Bradley Vierling – center (2008–09); Pittsburgh Steelers (2010), Jacksonville Jaguars (2010–11), Pittsburgh Steelers (2012)
Bill Wade – quarterback (1949–51); Southeastern Conference MVP (1951); Los Angeles Rams (1954–60), Chicago Bears (1961–66), NFL Champion (1963)
Henry Wakefield – end (1921–1924); consensus All-American (1924), All-Southern (1923, 1924)
E. M. "Nig" Waller – quarterback (1924–26); head coach, Middle Tennessee (1933–1934)
Stephen Weatherly – defensive end (2013–15); Minnesota Vikings (2016–19), Carolina Panthers (2020– )
Chris Williams – offensive tackle (2005–07); Chicago Bears (2008–12), St. Louis Rams (2012–13), Buffalo Bills (2014)
Jimmy Williams – defensive back (1997–2000); San Francisco 49ers (2001–04), Seattle Seahawks (2005–06), Houston Texans (2008)
Jamie Winborn – linebacker (1998–2000); 49ers (2001–05), Jaguars (2005–06), Buccaneers (2006–07), Broncos (2007–08), Titans (2009-10)
DeMond Winston – linebacker (1986–89), captain (1989); New Orleans Saints (1990–94)
Will Wolford – offensive lineman (1983–85); Buffalo Bills (1986–93), Indianapolis Colts (1993–96), Pittsburgh Steelers (1996-98), 3× Pro Bowl (1990, 1992, 1995)
Todd Yoder – tight end (1996–99); Tampa Bay Buccaneers (2000–03), Jacksonville Jaguars (2004–05), Washington Redskins (2006–09), Super Bowl XXXVII Champion
Other athletes
Marina Alex – American professional golfer, Cambia Portland Classic Winner (2018)
Lawson Aschenbach – professional racing driver; 4× Pirelli World Challenge Champion, 2014 Lamborghini Super Trofeo World Champion
Josie Barnes – American ten-pin bowler, 2021 U.S. Women’s Open Champion
Maria Bulanova – Russian ten-pin bowler, youngest player ever to win a European Bowling Tour title, age 14 (2013)
Fernanda Contreras – Mexican professional tennis player, 2017 Riviera All-American Championship
Jon Curran – American professional golfer, PGA Championship T33 (2016)
Julie Ditty – American professional tennis player, career-high WTA Tour ranking No. 89 (2008)
Andrea Farley – American professional tennis player, career-high WTA Tour ranking No. 118 (1989)
Walter Glasgow – American sailor, silver medal, fleet/match race keelboat open (Soling) mixed, 1976 Summer Olympics
Lina Granados – Colombian professional soccer player; defender, FF Lugano 1976
Ásthildur Helgadóttir – Icelandic soccer player, Iceland women's national football team (1993-2007), Breiðablik, KR, Malmö FF Dam
Tony Kuhn – American soccer player; forward, Major League Soccer
Peter Lamb – South African professional tennis player, 1978 Davis Cup team, Wimbledon (1980)
Luke List – American professional golfer, PGA Championship 6th (2019)
Cheyna Matthews – Jamaican footballer; forward, Washington Spirit, Jamaica women's national team
Scott A. Muller – Panamanian-American canoeist, whitewater slalom in the K-1 event at the 1996 Summer Olympics
Joan Pennington – competition swimmer who won one silver and two gold medals at the 1978 World Aquatics Championships, qualified for the 1980 Summer Olympics
Gil Reese – first three-sport captain (1922–25), halfback on the football team, forward on the basketball team, and outfielder on the baseball team
Bobby Reynolds – American professional tennis player, career-high ATP Tour ranking No. 63 (2009); ATP doubles title with Andy Roddick, RCA Championships (2006)
Jence Ann Rhoads – professional handball and basketball player, Huakar, Sepsi SIC, ICM Arad; Cupa României (2014); CB Atlético Guardés
Matthias Schwab – Austrian professional golfer, PGA European Tour
Peter Sharis – American olympic rower, competed in the men's coxless pair event at the 1992 Summer Olympics
Astra Sharma – Australian professional tennis player, career-high WTA Tour ranking No. 85 (2019)
Brandt Snedeker – American professional golfer, 2007 PGA Rookie of the Year, 2012 Tour Championship Winner
Chelsea Stewart – Canadian soccer player, defender for the German Bundesliga club SC Freiburg
Jerry Sularz – Polish soccer player, Górnik Wałbrzych (1967-1973)
Aleke Tsoubanos – American professional tennis player, 4× ITF Women's World Tennis Tour Circuit titles
Shannon Vreeland – competition swimmer, 2012 United States Olympic team, gold medal in the 4×200-meter freestyle relay at the 2012 London Summer Olympics
Business and economics
Bilikiss Adebiyi Abiola (M.S.) – Nigerian CEO of Wecyclers in Lagos, Nigeria
Jasbina Ahluwalia (B.A. 1991, M.A. 1992) – founder and CEO, Intersections Match
Michael Ainslie (B.A. 1965) – former president and CEO of Sotheby's
Anu Aiyengar (M.B.A. 1999) – Head of Mergers and Acquisitions at JPMorgan Chase & Co
James M. Anderson (J.D. 1966) – former president and CEO of the Cincinnati Children's Hospital Medical Center
John D. Arnold (B.A. 1995) – founder of Centaurus Energy and Arnold Ventures LLC, youngest self-made billionaire in Texas
Paul S. Atkins (J.D. 1983) – CEO of Patomak Global Partners LLC
Bill Bain (B.A. 1959) – founder of Bain & Company
Thomas W. Beasley (J.D. 1973) – co-founder of CoreCivic
Horace E. Bemis (B.S. 1891) – founder of the Ozan Lumber Company
Michael Bickford (B.A.) – founder and CEO of Round Hill Capital
Dennis C. Bottorff (B.E. 1966) – Chairman and CEO of the First American Corporation; co-founder, Council Capital
James Cowdon Bradford Sr. (College, 1912) – chairman of Piggly Wiggly, founder of J.C. Bradford & Co.
James W. Bradford (J.D. 1974) – former CEO of AFG Industries
Michael Burry (M.D. 1997) – founder of the Scion Capital LLC hedge fund, portrayed by Christian Bale in the 2015 film The Big Short
Kelly Campbell (B.S. 2000) – president of Hulu
Monroe J. Carell, Jr. (B.S. 1959) – former chairman and CEO of Central Parking Corporation
Dong-se Cha (M.A. 1974, Ph.D 1978) – Korean economist, former president of the Korea Development Institute
Whitefoord Russell Cole (B.A. 1894) – former president of the Louisville and Nashville Railroad
John Cooper (M.B.A. 1985) – former Global Head of Technology Investment Banking at Lehman Brothers
Alejandro E. Martínez Cuenca (Ph.D 1999) – owner of Joya de Nicaragua
Mark Dalton (J.D. 1975) – CEO of the Tudor Investment Corporation, Vanderbilt Board of Trust chairman (2010-2017)
John Danner (MEd 2002) – co-founder and CEO of Rocketship Education, co-founder of NetGravity, the world's first advertising server company
Joe C. Davis, Jr. (B.A. 1941) – founder and CEO of Davis Coals, Inc.
Krista Donaldson (B.E. 1995) – CEO of D-Rev
David Dyer (B.E. 1971) – former CEO of Land's End and Tommy Hilfiger
Dan K. Eberhart (B.A.) – CEO of Canary, LLC, managing partner of Eberhart Capital, LLC
John Edgerton (A.B. 1902, M.A.1903) – industrialist, president of the National Association of Manufacturers (1921–1931)
John A. Elkington (B.A.) – American developer, founding board member of the National Civil Rights Museum
Bruce R. Evans (B.E. 1981) – managing director of Summit Partners, Vanderbilt Board of Trust chairman
David Farr (M.B.A. 1981) – chairman and CEO of Emerson Electric
Mark L. Feidler (J.D. 1981) – chairman of Equifax
Erik Feig (1988–89) – president of Lionsgate Motion Picture Group
Zula Inez Ferguson (B.A.) – advertising manager at Blackstone's, Los Angeles
Greg Fischer (B.A. 1980) – co-invented and founded SerVend International, sold to The Manitowoc Company
Sam M. Fleming (B.A. 1928) – former president of the American Bankers Association
Adena Friedman (M.B.A. 1993) – president and CEO of NASDAQ
Thomas F. Frist Jr. (B.A. 1960) – billionaire entrepreneur, co-founder of the Hospital Corporation of America
Mahni Ghorashi (M.B.A. 2012) – co-founder of Clear Labs
Mitch Glazier (J.D. 1991) – chairman and CEO of the Recording Industry Association of America
Francis Guess (M.B.A.) – businessman and civil rights advocate, United States Commission on Civil Rights
John Hall (B.E. 1955) – former chairman and CEO of Ashland Oil
Arthur B. Hancock III (B.A. 1965) – American owner of thoroughbred racehorses, owner of Stone Farm
Matthew J. Hart (B.A. 1974) – former chairman and CEO of Hilton Hotels Corporation
Robert D. Hays (J.D. 1983) – chairman of King & Spalding
Bruce Henderson (B.S. 1937) – founder of the Boston Consulting Group
Robert Selph Henry (LL.B 1910, B.A. 1911) – vice president of the Association of American Railroads (1934–1958)
Bruce Heyman (B.A. 1979, M.B.A. 1980) – vice president and managing director of private wealth management at Goldman Sachs
Chris Hollod (B.A. 2005) – venture capitalist and angel investor
David S. Hong (M.A. 1967) – 5th president of the Taiwan Institute of Economic Research
Frank K. Houston (B.A. 1904) – president and chairman of the Chemical Corn Exchange Bank
Allan Hubbard (B.A. 1969) – director of the National Economic Council
David Bronson Ingram (M.B.A. 1989) – chairman and president of Ingram Entertainment
John R. Ingram (M.B.A. 1986) – billionaire chairman and CEO of the Ingram Content Group
Orrin H. Ingram II (B.A. 1982) – CEO of Ingram Industries, chairman of the Ingram Barge Company
Paul Jacobson (MBA 1997) – CFO of Delta Air Lines
Prashant Khemka (M.B.A. 1998) – former CIO of Global Emerging Markets at Goldman Sachs, founder of White Oak Capital Management
J. Hicks Lanier (B.A. 1962) – chairman and CEO of Oxford Industries
Sartain Lanier (B.A. 1931) – chairman and CEO of Oxford Industries
Chong Moon Lee (M.L.S. 1959) – founder of Diamond Multimedia
Oliver Luckett (B.A. 1996) – American entrepreneur, founded Revver
R. Brad Martin (E.M.B.A. 1980) – former chairman and CEO of Saks Incorporated
Mark P. Mays (B.A. 1985) – president and CEO of Clear Channel Communications
Mike McWherter (J.D. 1981) – chairman of the board of First State Bank
Lydia Meredith (M.B.A) – former CEO of the Renaissance Learning Center
Todd Miller (B.A. 1988) – media executive, CEO of Celestial Tiger Entertainment
Ann S. Moore (B.A. 1971) – former chairman and CEO of Time Inc.
Jackson W. Moore (J.D. 1973) – former executive chairman of Union Planters Bank and Regions Financial Corporation
J. Reagor Motlow (B.A. 1919) – former president of Jack Daniel's
Mubyarto (M.A. 1962) – Indonesian economist, developer of Pancasila economics, Bintang Jasa Utama (1994)
Tim Murray (E.M.B.A. 2003) – CEO of Alba
Roy Neel (B.A. 1972) – president and CEO of the United States Telecom Association
Ralph Owen (B.A. 1928) – chairman of American Express
Kevin Parke (B.A. 1981) – president of the Todd Wagner Foundation, former president of Landmark Theatres
Doug Parker (M.B.A. 1986) – chairman, president, and CEO of American Airlines Group
Sunil Paul (B.E. 1987) – entrepreneur, founder of Brightmail, co-founder and CEO of Sidecar
Brittany Perkins (B.A. 2008) – CEO of AshBritt Environmental
H. Ross Perot, Jr. (B.A. 1981) – billionaire chairman and CEO of Perot Systems, former owner of the Dallas Mavericks
Charles Plosser (B.E. 1970) – president of the Federal Reserve Bank of Philadelphia, former co-editor of the Journal of Monetary Economics
Edgar E. Rand (B.A. 1927) – former president of the International Shoe Company
Frank C. Rand (B.A. 1898) – former president of the International Shoe Company, Vanderbilt Board of Trust chairman (1935–1949)
Henry Hale Rand (B.A. 1929) – former president of the International Shoe Company
Alexis Readinger (B.A. 1996) – founder of Preen, Inc.
Mark Reuss (B.A. 1986) – president of General Motors
Catherine Reynolds (B.S. 1979) – Former CEO of EduCap, chairman/CEO, Catherine B. Reynolds Foundation, Bloomberg Businessweek top 50 philanthropic Americans
Russ Robinson (B.A. 1979) – founder and CEO of Global Steel Dust
Joe L. Roby (B.A. 1961) – chairman emeritus, Credit Suisse investment banking division
Jeffrey J. Rothschild (B.A. 1977, M.S. 1979) – billionaire entrepreneur and executive, founding engineer of Facebook
Mike Shehan (B.S. 1994) – co-founder and CEO of SpotX
Jane Silber (M.S.) – former CEO of Canonical Ltd.
Chip Skowron (B.A. 1990) – portfolio manager at FrontPoint Partners
John Sloan Jr. (B.A. 1958) – VP of the First American National Bank, President and CEO of the National Federation of Independent Business
Alexander C. Taylor (B.A. 1997) – president and CEO of Cox Enterprises
Betty Thayer (M.B.A. 1982) – CEO of Exec-appointments.com, sold to Financial Times
Hall W. Thompson – founder and developer of Shoal Creek Club
Cal Turner, Jr. (B.A. 1962) – billionaire CEO of Dollar General
William S. Vaughn (B.A. 1923) – Rhodes Scholar, former president and chairman of Eastman Kodak
Thomas B. Walker, Jr. (B.A. 1947) – Goldman Sachs senior director, Vanderbilt Board of Trust
Emily White (B.A. 2000) – former COO of Snapchat, current board member of Hyperloop One
Christopher J. Wiernicki (B.S.) – chairman, president, and CEO of American Bureau of Shipping
Darrin Williams (J.D. 1993) – CEO of Southern Bancorp Inc.
David K. Wilson (B.A. 1941) – co-founder and president of Cherokee Equity, chairman of Genesco, Vanderbilt Board of Trust chairman (1981–91)
Toby S. Wilt (B.E. 1967) – president, TSW Investment Company, Director, CapStar Bank
Philip C. Wolf (M.B.A. 1980) – founder and CEO of PhoCusWright
Muhammad Yunus (Ph.D 1971) – founder of Grameen Bank, pioneer of microcredit; 2006 Nobel Peace Prize winner, 2009 Presidential Medal of Freedom
Entertainment and fashion
Jim Beavers (M.B.A. 1996) – American songwriter, former director of marketing for Capitol Records
Dierks Bentley (B.A. 1997) – country musician
Curtis Benton – actor, 20,000 Leagues Under the Sea (1916), Jealousy (1916), Kid Galahad (1937); writer, The Uninvited Guest (1924)
Cinda Boomershine (B.A. 1994) – founder of fashion accessory line Cinda b
Harold Bradley* (B.A. 1949) – American session guitarist and entrepreneur, Musician's Hall of Fame (2007)
Joe Bob Briggs (B.A. 1974) – syndicated American film critic, writer, actor, and comic performer
Logan Browning (B.A. 2011) – American actress, lead in Dear White People
Paula Cale – actress best known for her role as Joanie Hansen on the series Providence
Rosanne Cash (B.A. 1979) – Grammy Award-winning singer and songwriter
Fred Coe* – American television and Broadway producer and director, Peabody and Emmy Award winner
Rod Daniel (B.A. 1964) – American television and film director best known for the Michael J. Fox film Teen Wolf (1985)
Kim Dickens (B.A. 1987) – actress, Deadwood (2004–06), Gone Girl (2014), House of Cards (2015–17)
Deena Dill (B.S. 1992) – American actress and television executive producer
Jimmie Dodd – host of the Walt Disney's The Mickey Mouse Club, actor, Easter Parade (1948), Quicksand (1950)
George Ducas (B.A. 1989) – country music artist
Bob Ferguson (M.A.) – Billboard-topping songwriter, senior record producer for RCA Victor
Chad Gervich (B.A. 1996) – television writer; playwright; author, Small Screen, Big Picture: A Writers Guide to the TV Business
Amy Grant – six-time Grammy-winning contemporary Christian music artist (dropped out)
William Gray Espy – actor, The Young and the Restless
Richard Hull (B.A. 1992) – American media and entertainment executive; Producer, She's All That; 2011 NAACP Image Award
Claude Jarman Jr. – American former child actor, received a special Academy Award as outstanding child actor of 1946 for The Yearling
Kevin Royal Johnson (B.E. 1984) – American singer-songwriter, founding member of The Linemen
Duncan Jones – British film director, Source Code (2011), Warcraft (2016), Mute (2018), BAFTA Award winner
Edward Kerr (B.A. 1990) – actor, Pretty Little Liars, starred in Above Suspicion
Charles D. King (B.A. 1991) — producer of Fences (2016), Mudbound (2017), Judas and the Black Messiah (2021)
Jill King (B.A. 1996) – country music artist
Lance Kinsey (B.A. 1975) – Canadian actor and screenwriter, best known for his role as Lt. Proctor in the Police Academy film series
Richard Kyanka (M.A.) – creator of humor website Something Awful
Susanna Kwan (M.F.A.) – Hong Kong singer and actress, Heart of Greed, Moonlight Resonance
Lunic (B.S. 1999) – songwriter, singer, electronic musician, & multi-instrumentalist Kaitee Page
Steven Machat (J.D. 1977) – entertainment mogul and producer
Chris Mann (B.M. 2004) – singer; fourth place in season 2 of The Voice
Delbert Mann (B.A. 1941) – Academy Award-winning director for Marty (1955)
James Melton – American popular music actor/singer, Stars Over Broadway (1935), Ziegfeld Follies (1945)
R. Stevie Moore – multi-instrumentalist singer-songwriter who pioneered lo-fi/DIY music
Zack Norman – American entertainer and film financier, known for his role as Ira in Romancing the Stone (1984)
Bettie Page* (B.A. 1944) – American model, 1950s pin-up icon
Zhubin Parang (B.A. 2003) – head writer of The Daily Show
Saladin K. Patterson – writer, Frasier, The Bernie Mac Show; creator and executive producer, The Wonder Years
Woody Paul (B.E. 1977) – member of Riders in the Sky
Amy Ray – singer, songwriter, member of the Indigo Girls (transferred)
Donna Sachet (B.A. 1976) – American drag actor, singer, and activist
Dinah Shore (B.A. 1938) – top-charting female vocalist of the 1940s; actress; television host, The Dinah Shore Show, Dinah!
Scott Siman (B.A. 1976) – music executive, artist manager, former chairman of the Academy of Country Music
Molly Sims – model, actress (dropped out to pursue modeling)
Brock Speer (M.Div) – bass singer for the Speer Family Southern Gospel group
Chris Stapleton (dropped out) – singer-songwriter, guitarist, and record producer
Stephanie Storey (B.A. 1997) – actress; screenwriter; director; novelist; producer, The Writers' Room
Brooklyn Sudano – model, actress, and singer
Mikey Wax – singer-songwriter
Tim Weiland (B.A. 2006) – fashion designer and DJ; founder, creative director, Timo Weiland
Whitney Wolanin (B.S. 2011) – American singer and songwriter
Paul Worley (B.A. 1972) – American record producer, discovered Lady Antebellum and the Dixie Chicks
Andrea Zonn (B.M.) – singer and fiddle player
Government, politics, and activism
U.S. Vice Presidents
John Nance Garner (Law, 1886) – 32nd Vice President of the United States and 39th Speaker of the United States House of Representatives
Al Gore (Div, 1971–72) – 45th Vice President of the United States; former U.S. Senator; former U.S. Representative; environmental activist; Nobel Laureate (2007)
U.S. Cabinet and heads of federal agencies
Lamar Alexander (B.A. 1962) – 5th United States Secretary of Education
Jake Brewer (B.S. 2004) – White House senior policy adviser in the Office of Science and Technology Policy, Obama administration
H. Lee Buchanan III (B.S. 1971, M.S. 1972) – 4th Assistant Secretary of the Navy (Research, Development and Acquisition)
Robert W. Cobb (B.A. 1982) – NASA Inspector General (2002–2009)
Tom Cochran (B.A.) – White House Director of New Media Technologies, Obama administration
Bill Corr (J.D. 1973) – 9th Deputy Secretary of the United States Department of Health and Human Services
James Danly (J.D. 2013) – Commissioner of the Federal Energy Regulatory Commission
Norman Davis – 2nd Under Secretary of State; represented the U.S. at the Paris Peace Conference, League of Nations, and Geneva Conference
Paul Rand Dixon (B.A. 1936) – former chairman and 14th Commissioner of the Federal Trade Commission (1961–1969, 1976)
John Edgerton (B.A. 1902, M.A. 1903) – held economic executive appointments by President Warren G. Harding and President Herbert Hoover
William Yandell Elliott (B.A. 1918) – member of the Fugitives, Rhodes Scholar, political advisor to six U.S. presidents
Phyllis Fong (J.D. 1978) – Inspector General of the United States Department of Agriculture
Vince Foster – former Deputy White House Chief of Staff
J. Christopher Giancarlo (J.D. 1984) – 38th chairman of the United States Commodity Futures Trading Commission (CFTC)
Tipper Gore (M.A. 1975) – activist, 35th Second Lady of the United States
E. William Henry (J.D. 1957) – 14th chairman of the Federal Communications Commission
Allan B. Hubbard (B.A. 1969) – economic adviser to President George W. Bush, 6th director of the National Economic Council
Gus Hunt (B.E. 1977, M.E. 1982) – chief technology officer at the CIA
Mickey Kantor (B.A. 1951) – 11th United States Trade Representative, 31st United States Secretary of Commerce
Robert L. King (J.D. 1971) – Assistant Secretary of Education, serving as head of the Office of Postsecondary Education
Bill Lacy (B.A.) – political operative, business executive, and director of the Robert J. Dole Institute of Politics
Howard Liebengood (J.D. 1967) – 27th Sergeant at Arms of the United States Senate
Marvin H. McIntyre – 17th Secretary to the President of the United States, Franklin D. Roosevelt
James Clark McReynolds (B.S. 1882) – 48th Attorney General of the United States
Roy Neel (B.A. 1972) – Deputy Chief of Staff for former President Bill Clinton; 8th Chief of Staff for Al Gore
Paul C. Ney Jr. (JD, MBA 1984) – General Counsel of the Department of Defense of the United States, Trump administration
Jerry Parr (B.A. 1962) – United States Secret Service agent, credited with helping to save President Reagan's life on the day of his assassination attempt
Stephen D. Potts (B.A. 1952, LL.B 1954) – 4th director of the United States Office of Government Ethics
Roger Ream (B.A. 1977) – president of The Fund for American Studies (TFAS)
Phil Reitinger (B.E. 1984) – former director of the National Cybersecurity Center at the Department of Homeland Security
John Wesley Snyder – 54th United States Secretary of the Treasury
Hans von Spakovsky (J.D. 1984) – 22nd Federal Election Commission Commissioner
Nancy Soderberg (B.A. 1980) – foreign policy advisor, strategist, U.S. National Security Council, representative to the United Nations Security Council
John R. Steelman (M.A. 1924) – 1st White House Chief of Staff, Truman Administration
Gordon O. Tanner (J.D. 1973) – General Counsel of the Air Force
Jon R. Thomas (M.A. 1995) – Assistant Secretary of State for International Narcotics Matters, United Nations Commission on Narcotic Drugs
John J. Tigert (B.A. 1904) – 7th United States Commissioner of Education
Stephen Vaden (B.A.) – General Counsel of the United States Department of Agriculture, Trump administration
Carlos Clark Van Leer (LL.B 1895) – Chief of the Personnel Classification Board, United States Department of the Treasury
Stephen Vaughn (B.A. 1988) – former acting United States Trade Representative, General Counsel to the United States Trade Representative
Jack Watson (B.A. 1960) – 9th White House Chief of Staff, Carter Administration
Gus W. Weiss (B.A.) – White House policy adviser on technology, intelligence and economic affairs, worked on the Farewell Dossier
U.S. Governors
Greg Abbott (J.D. 1984) – 48th Governor of Texas (2015– )
Lamar Alexander (B.A. 1962) – 45th Governor of Tennessee (1979–1987)
Andy Beshear (B.A. 2000) – 61st Governor of Kentucky (2019– )
Theodore Bilbo (Peabody, Law, 1900) – 39th and 43rd Governor of Mississippi (1916–1920; 1928–1932)
Frank G. Clement – 41st Governor of Tennessee (1963–1967)
Prentice Cooper (Col 1914–1916) – 39th Governor of Tennessee (1939–1945)
Lee Cruce (Law, 1885) – 2nd Governor of Oklahoma (1911–1915)
Jeff Davis (Law, 1882) – 20th Governor of Arkansas (1901–1907)
William Haselden Ellerbe – 86th Governor of South Carolina (1897–1899)
Joseph W. Folk (LL.B 1890) – 31st Governor of Missouri (1905–1909)
Hill McAlister (LL.B 1897) – 34th Governor of Tennessee (1933–1937)
Malcolm R. Patterson (Law, 1882) – 30th Governor of Tennessee (1907–1911)
Park Trammell – 21st Governor of Florida (1913–1917)
Members of the U.S. Senate
Lamar Alexander (B.A. 1962) – United States Senator from Tennessee (2003–2021)
Theodore Bilbo (Peabody, Law, 1900) – United States Senator from Mississippi (1935–1947)
Jeff Davis – United States Senator from Arkansas (1907–1913)
Nathaniel B. Dial – United States Senator from South Carolina (1919–1925)
James Eastland (Col 1925–1926) – United States Senator from Mississippi (1943–1978), President pro tempore (1972–1978)
Duncan U. Fletcher (LL.B 1880) – United States Senator from Florida (1909–1936), led the Pecora Commission
Bill Hagerty (B.A. 1981, J.D. 1984) – United States Senator from Tennessee (2021– )
John Neely Kennedy (B.A. 1973) – United States Senator from Louisiana (2017– )
Harlan Mathews (MPA 1958) – United States Senator from Tennessee (1993–1994)
Floyd M. Riddick (M.A. 1932) – Parliamentarian of the United States Senate (1964 to 1974), developed Riddick's Senate procedure
Jim Sasser (B.A. 1958, LL.B 1961) – United States Senator from Tennessee (1977–1995)
William V. Sullivan (LL.B 1875) – United States Senator from Mississippi (1898–1901)
Fred Dalton Thompson (J.D. 1967) – United States Senator from Tennessee (1994–2003)
Park Trammell – United States Senator from Florida (1917–1936)
Members of the U.S. House of Representatives
William Vollie Alexander, Jr. (J.D. 1960) – United States Representative from Arkansas (1969–1993)
Robert E. Lee Allen* – United States Representative from West Virginia (1923–1925)
James Benjamin Aswell* (B.A. 1893) – United States Representative from Louisiana (1913–1931)
Richard Merrill Atkinson (B.A. 1916) – United States Representative from Tennessee (1937–1939)
Jim Bacchus (B.A. 1971) – United States Representative from Florida (1991–1995)
Laurie C. Battle – United States Representative from Alabama (1947–1955)
Robin Beard (B.A. 1961) – United States Representative from Tennessee (1973–1983)
Richard Walker Bolling (Grad. Studies 1939–1940) – United States Representative from Missouri (1979–1983)
Bill Boner (M.A. 1969) – United States Representative from Tennessee (1979-1987)
John L. Burnett (Law 1876) – United States Representative from Alabama (1899–1919)
Jo Byrns (LL.B 1882) – 41st Speaker of the United States House of Representatives
Joseph W. Byrns Jr. (J.D. 1928) – United States Representative from Tennessee (1938–1941)
Steve Cohen (B.A. 1971) – United States Representative from Tennessee (2007– )
W. Wirt Courtney – United States Representative from Tennessee (1939–1949)
Ewin L. Davis (Col. 1895–97) – United States Representative from Tennessee (1919–1933)
William A. Dickson – United States Representative from Mississippi (1909–1913)
Joe L. Evins (B.A. 1933) – United States Representative from Tennessee (1953–1977)
John W. Gaines (M.D. 1882) – United States Representative from Tennessee (1897–1909)
William Wirt Hastings (J.D. 1889) – United States Representative from Oklahoma (1915–1921)
French Hill (B.S. 1978) – United States Representative from Arkansas (2015– )
Sam Hobbs – United States Representative from Alabama (1935–1951)
Henderson M. Jacoway (J.D. 1898) – United States Representative from Arkansas (1911–1923)
Joseph T. Johnson (LL.B 1883) – United States Representative from South Carolina (1901–1915)
Ric Keller (J.D. 1992) – United States Representative from Florida (2001–2009)
Richard Kelly – United States Representative from Florida (1975–1981)
Charles Landon Knight (B.A. 1889) – United States Representative from Ohio (1921–1923)
Charles M. La Follette (J.D.) – United States Representative from Indiana (1943–1947)
Leonard Lance (J.D. 1977) – United States Representative from New Jersey (2009–2019)
Fritz G. Lanham (Law, 1897–98) – United States Representative from Texas (1919–1947)
Oscar Lovette (J.D. 1896) – United States Representative from Tennessee (1931–1933)
Luke Messer (J.D. 1994) – United States Representative from Indiana (2013–2019)
Malcolm R. Patterson (Law, 1882) – United States Representative from Tennessee (1901–1906)
James Percy Priest* – United States Representative from Tennessee (1941–1956)
Ben Quayle (J.D. 2002) – United States Representative from Arizona (2011–2013)
Frazier Reams (J.D. 1922) – United States Representative from Ohio (1951–1955)
Charles C. Reid (J.D. 1887) – United States Representative from Arkansas (1901–1911)
John Rose (J.D. 1993) – United States Representative from Tennessee (2019– )
J. William Stokes (M.D. 1888) – United States Representative from South Carolina (1896–1901)
Charles Swindall – United States Representative from Oklahoma (1920–1921)
Joseph E. Washington (LL.B 1874) – United States Representative from Tennessee (1887–1897)
U.S. Supreme Court justices
James Clark McReynolds (B.S. 1882) – Associate Justice of the Supreme Court of the United States (1914–1941)
U.S. Ambassadors and diplomats
Alvin P. Adams Jr. (LL.B 1967) – former United States Ambassador to Peru, Haiti, and Djibouti
Waldo Emerson Bailey* (M.A. 1927) – U.S. Consul to London, England
John Barrett – former United States Ambassador to Colombia, Panama, and Argentina
William J. Cabaniss (B.A. 1960) – 5th United States Ambassador to the Czech Republic
Roxanne Cabral (B.A.) – 10th United States Ambassador to the Marshall Islands
Brian E. Carlson (B.A. 1969) – 10th United States Ambassador to Latvia
William Prentice Cooper, Jr. – 31st United States Ambassador to Peru
Marion V. Creekmore Jr. (B.A. 1961) – 8th United States Ambassador to Sri Lanka and the Maldives
K. Terry Dornbush (B.A. 1955) – 60th United States Ambassador to the Netherlands
Guilford Dudley (B.A. 1929) – 49th United States Ambassador to Denmark
Thomas C. Ferguson (B.A. 1955, J.D. 1959) – 2nd United States Ambassador to Brunei
William Hagerty (B.A. 1981, J.D. 1984) – 30th United States Ambassador to Japan
Bruce Heyman (B.A. 1979, M.B.A. 1980) – 30th United States Ambassador to Canada
Greta C. Holtz (B.S. 1982) – United States Ambassador to Oman and Qatar
Marshall Fletcher McCallie (B.A. 1967) – 2nd United States Ambassador to Namibia
Louis J. Nigro Jr. (Ph.D 1979) – 19th United States Ambassador to Chad
W. Robert Pearson (B.A. 1965) – 23rd United States Ambassador to Turkey, president of IREX
Jim Sasser (B.A. 1958, J.D. 1961) – 44th United States Ambassador to China
Linda Ellen Watt (B.A. 1973) – 36th United States Ambassador to Panama
Mayors
Megan Barry (MBA 1993) – former mayor of Nashville Tennessee
Ann Womer Benjamin (B.A. 1975) – mayor of Aurora, Ohio
Bill Boner (M.A. 1969) – former mayor of Nashville, Tennessee
Beverly Briley – former mayor of Nashville, Tennessee
Bill Campbell (B.A. 1974) – former mayor of Atlanta, Georgia
Miguel Colasuonno (Ph.D.) – former mayor of São Paulo, Brazil
John Cooper (M.B.A. 1985) – mayor of Nashville, Tennessee
Thomas L. Cummings Sr. (J.D. 1915) – former mayor of Nashville, Tennessee
Karl Dean (J.D. 1981) – former mayor of Nashville, Tennessee
J. Kane Ditto (J.D. 1969) – former mayor of Jackson, Mississippi
Greg Fischer (B.A. 1980) – mayor of Louisville, Kentucky
Jim Gray (B.A. 1975) – former mayor of Lexington, Kentucky
Dorsey B. Hardeman (LL.B 1931) – former mayor of San Angelo, Texas
Pam Hemminger (B.A. 1982) – mayor of Chapel Hill, North Carolina
Nelson Madore (Ed.D. 1982) – former mayor of Waterville, Maine
Dee Margo (B.A. 1974) – mayor of El Paso, Texas
Bill Purcell (J.D. 1979) – former mayor of Nashville, Tennessee
Steven Reed (MBA 2004) – mayor of Montgomery, Alabama
Woodall Rodgers (B.A. 1912) – mayor of Dallas, Texas
Sam Sutter (J.D. 1983) – former mayor of Fall River, Massachusetts
Tom Tait (J.D., M.B.A. 1985) – mayor of Anaheim, California
Joseph Vas (B.A) – former mayor of Perth Amboy, New Jersey
Ben West – former mayor of Nashville, Tennessee
Other U.S. state officials
Jon Applebaum (B.A. 2007) – former member of the Minnesota House of Representatives
Bruce Bennett (J.D. 1949) – 38th Attorney General of Arkansas
Preston Lang Bethea* (B.A. 1891) – member of the South Carolina Senate
Bob Blake (LL.B 1908) – president of the Missouri Constitutional Convention in 1944
Will Bond (B.A. 1992) – member of the Arkansas Senate
William West Bond (B.A. 1907) – 62nd Speaker of the Tennessee Senate
George Street Boone (J.D. 1941) – member of the Kentucky House of Representatives
Peter Breen (B.E. 1997) – member of the Illinois House of Representatives
Dick Brewbaker (B.S. 1983) – former member of the Alabama Senate
Tony Brown (M.A.) – former member of the Kansas House of Representatives
Lance Cargill (J.D. 1996) – lawyer and former Speaker of the Oklahoma House of Representatives
William Prentice Cooper, Sr. (B.A. 1890) – Speaker of the Tennessee House of Representatives
Brad Courtney (B.A. 1981) – Chairman of the Republican Party of Wisconsin
Alexander G. Crockett (M.D. 1885) – former member of the Virginia Senate
Cal Cunningham – former member of the North Carolina Senate
Riley Darnell (J.D. 1965) – 37th Tennessee Secretary of State
Walter Naylor Davis (B.A. 1898) – 34th Lieutenant Governor of Missouri
Neria Douglass (J.D. 1977) – 50th Maine State Treasurer
Steve Freudenthal (J.D. 1975) – 28th Attorney General of Wyoming
Chris Gebhard (B.A. 1996) – member of the Pennsylvania Senate
Bill Gibbons (J.D.) – District Attorney General of Memphis, Tennessee
Mary Stuart Gile (Ed.D. 1982) – former member of the New Hampshire House of Representatives
Michele Guyton (B.A. 1989) – member of the Maryland House of Delegates
Dorsey B. Hardeman (LL.B 1931) – former member of the Texas House of Representatives and the Texas Senate
William C. Harrison (Ed.D. 1985) – former chairman of the North Carolina State Board of Education
Beth Harwell (M.S. 1979, Ph.D 1982) – 81st Speaker of the Tennessee House of Representatives
Douglas Henry (B.A. 1949, J.D. 1951) – member of the Tennessee Senate, activist
Roy Herron (J.D. 1980, M.Div 1980) – former chairman of the Tennessee Democratic Party
Ashley Hudson (B.A. 2001) – member of the Arkansas House of Representatives
David J. Jordan (J.D. 1979) – chair of the Board of Regents of the Utah System of Higher Education
Jonathan Jordan (M.B.A. 1992) – former member of the North Carolina House of Representatives
Harold A. Katz (B.A. 1943) – former member of the Illinois House of Representatives
Jen Kiggans (M.S.N 2012) – member of the Virginia Senate
Robert L. King (J.D.) – former member of the New York State Assembly
Naomi C. Matusow (B.A. 1960) – member of the New York State Assembly
William Harding Mayes (LL.B 1881) – Lieutenant Governor of Texas
J. Washington Moore (B.A. 1890, LL.B 1891) – Eminent Supreme Archon of Sigma Alpha Epsilon, 1891–1894
Seth Walker Norman – former member of the Tennessee House of Representatives
Mary Margaret Oliver (B.A. 1969) – member of the Georgia House of Representatives
Howard T. Owens Jr. (J.D. 1959) – former member of the Connecticut Senate
Steve Owens (J.D. 1981) – Chairman of the Arizona Democratic Party
E. Melvin Porter (J.D. 1959) – member of the Oklahoma Senate, civil rights leader
Barbara Rusling (B.A. 1966) – former member of the Texas House of Representatives
Edward T. Seay (LL.B 1891) – former Speaker of the Tennessee Senate
Amanda Septimo (B.A. 2021) – member of the New York State Assembly
David H. Simmons (J.D. 1977) – president pro tempore of the Florida Senate
David Simpson (B.A. 1983) – former member of the Texas House of Representatives
Charlie Stallworth (M.Div) – member of the Connecticut House of Representatives
Joe Straus (B.A. 1982) – Speaker of the Texas House of Representatives
Jim Summerville (M.A. 1983) – former member of the Tennessee Senate
John Peroutt Taylor (M.D. 1881) – 32nd Mississippi State Treasurer
Paul Thurmond (B.S. 1998) – former member of the South Carolina Senate
Joseph Vas (B.A) – former member of the New Jersey General Assembly
Jody Wagner (J.D. 1980) – 12th Virginia Secretary of Finance
Justin P. Wilson (J.D. 1970) – lawyer, Comptroller of Tennessee
Foreign presidents, prime ministers, heads of government
Abdiweli Mohamed Ali (M.A. 1988) – 15th Prime Minister of Somalia, 8th President of Puntland
Chung Won-shik (M.A. 1958, Ph.D 1966) – 21st Prime Minister of South Korea
José Ramón Guizado (B.E. 1920) – 17th President of Panama
Thomas C. Jefferson, (M.A. 1975) – 1st Premier of the Cayman Islands
Other foreign officials
Carlos Gerardo Acevedo (Ph.D) – 9th President of the Central Reserve Bank of El Salvador
Jawad Anani (M.A. 1970) – former Minister of Labor of Jordan
Lawrence Ang – director of the Commercial Affairs Department of Singapore
Jusuf Anwar (M.A. 1978) – 25th Minister of Finance of Indonesia, 15th Indonesian Ambassador to Japan
Jim Bacchus (B.A. 1971) – former chairman of the Appellate Body of the World Trade Organization
Bijaya Nath Bhattarai (M.A. 1979) – 13th Governor of the Nepal Rastra Bank
Abdallah Bou Habib (Ph.D 1975) – 48th Minister of Foreign Affairs of Lebanon
Grace Coleman (M.A. 1979) – former MP of Ghana and Ghanaian Ambassador to the Netherlands
Yeda Crusius (M.A. 1971) – 36th Governor of the Brazilian state of Rio Grande do Sul
María de Lourdes Dieck-Assad (M.A. 1976) – former Mexican ambassador to Belgium and Luxembourg; European Council representative
Gazi Erçel (M.A. 1976) – 10th Governor of the Central Bank of Turkey, former Deputy Executive Director, IMF
Ibrahim Eris (Ph.D 1975) – 15th President of the Central Bank of Brazil
Abu Hena Mohammad Razee Hassan (M.A.) – Chief Executive, Bangladesh Financial Intelligence Unit
Patrick Ho (M.D. 1976) – 4th Secretary for Home Affairs, Hong Kong
Mario Miguel Carrillo Huerta (M.A. 1976) – member of the Chamber of Deputies of the LXII Legislature of the Mexican Congress
Kwon Hyouk-se (M.A. 1998) – 8th Governor of the Financial Supervisory Service of South Korea
Abdallah Kigoda (M.A. 1980) – 8th Minister of Industry and Trade of Tanzania
Redley A. Killion (M.A. 1978) – 6th Vice President of Micronesia
Rudolf Kujath (M.A. 1971) – former member of the Abgeordnetenhaus of Berlin
Irek Kusmierczyk (Ph.D 2010) – member of the Parliament of Canada for Windsor—Tecumseh
Liang Kuo-shu (Ph.D 1970) – 14th Governor of the Central Bank of the Republic of China
Ashwin Mahesh (M.S. 1993) – former national vice president of the Lok Satta Party in India
Moshe Mendelbaum (M.A. 1960) – 4th Governor of the Bank of Israel
Dante Mossi (Ph.D 1996) – Executive President of the Central American Bank for Economic Integration
Yoo Myung-hee (J.D. 2002) – former Minister of Trade of South Korea
Ihor Petrashko (M.B.A. 2001) – 3rd Minister of Economic Development and Trade of Ukraine
Pedro Pinto Rubianes – 44th Vice President of Ecuador
Syahril Sabirin (Ph.D 1979) – 11th Governor of the Bank of Indonesia
Baso Sangqu (M.A. 1999) – former President of the United Nations Security Council, South African Permanent Representative
Süreyya Serdengeçti (M.A. 1986) – Turkish economist and 11th Governor of the Central Bank of Turkey
Soemarno Sosroatmodjo (M.A.) – 5th Governor of Jakarta, Indonesia
Thorsteinn Thorgeirsson (M.A. 1988) – former director-general of the Icelandic Ministry of Finance
Wang Tso-jung (M.A. 1958) – 6th President of the Control Yuan of the Government of the Republic of China, Order of Propitious Clouds (2013)
Activists
Will W. Alexander (B.Th 1912) – founder of the Commission on Interracial Cooperation
John Amaechi, – English psychologist, consultant, first former NBA player to come out publicly
Akosua Adomako Ampofo (Ph.D. 2000) – Ghanaian public intellectual, activist and scholar, Fulbright Scholar
Elizabeth Lee Bloomstein (B.A. 1877 Peabody) – American history professor, clubwoman, and suffragist
David Boaz (B.A. 1975) – executive vice-president, Cato Institute, leading libertarian thinker
Yun Chi-ho (Div. 1888–1891) – political activist and thinker during the late 1800s and early 1900s in Joseon Korea
George Childress* (B.A. 1826 Peabody) – lawyer, politician, and a principal author of the Texas Declaration of Independence
J. McRee Elrod* (M.A. 1953) – Methodist activist for the Civil Rights Movement, anti-war movements of the 1960s, and the gay pride movement
Hiram Wesley Evans – dental student (did not graduate), Imperial Wizard of the Ku Klux Klan
Peter Farb (B.A. 1950) – author and noted spokesman for environmental conservation
Tom Fox (B.A. 1973) – Quaker peace activist, kidnapped on November 26, 2005, in Baghdad, leading to the 2005-2006 Christian Peacemaker hostage crisis
Morris Frank (B.A. 1929) – founder of The Seeing Eye, the first guide-dog school in the United States, activist for accessibility for the visually impaired
John E. Fryer (M.D. 1962) – gay rights activist known for his anonymous speech at the 1972 American Psychiatric Association conference where he appeared in disguise as Dr. Henry Anonymous
Bennett Haselton (M.A.) – founder of Circumventor.com and Peacefire.org, listed in Google Vulnerability Program Hall Of Fame for finding and fixing security holes in Google products
John Jay Hooker (J.D. 1957) – American lawyer, entrepreneur, political gadfly, special assistant to Robert F. Kennedy
Elizabeth Dearborn Hughes (B.A. 2006) – founder of the Akilah Institute in Kigali, Rwanda's first women's college
Howard Kester (B.D. 1931) – clergyman and social reformer, organized the Southern Tenant Farmers Union designed by President Franklin D. Roosevelt
George Ross Kirkpatrick – American anti-militarist writer and political activist, 1916 Vice Presidential nominee of the Socialist Party of America
James Lawson (M.Div 1960) – civil rights pioneer
Robert V. Lee (B.A. 1972) – humanitarian, Episcopal priest, chairman and CEO of FreshMinistries, HIV/AIDS activist
Millicent Lownes-Jackson (M.B.A., Ph.D.) – founder, The World Institute for Sustainable Education and Research (The WISER Group)
Sara Alderman Murphy (B.A. 1945) – civil rights activist, founder of Peace Links
Marie Ragghianti (B.S. 1975) – American parole board administrator, whistleblower who exposed Ray Blanton's "clemency for cash" scandal
Arthur F. Raper (M.A. 1925) – sociologist, Commission on Interracial Cooperation
Charlie Soong (B.Th 1885) – Chinese missionary and businessman, key figure in the Xinhai Revolution of 1911, father of the Soong sisters
Julie Tien (M.L.S.) – Taiwanese politician and activist, National Women's League of Taiwan
Madhavi Venkatesan (B.A., M.A., Ph.D.) – economist and environmental activist, founder and executive director of Sustainable Practices
Don West (D.Div 1932) – civil rights activist, labor organizer, poet, educator
Marie C. Wilson (B.A. 1962) – founder and president emerita of The White House Project, founder of Ms. Foundation for Women
Wolf Wolfensberger* (Ph.D 1962) – influencer of disability policy through his development of social role valorization, exposed Nazi death camp targeting of the disabled
Journalism and media
Michelle Alexander (B.A. 1989) – author of The New Jim Crow, columnist for The New York Times, Truman Scholar
Joseph Alexander Altsheler – American reporter and editor, New York World
Thomas J. Anderson (B.A. 1934) – American columnist and publisher, American Party presidential nominee in 1976
Skip Bayless (B.A. 1974) – Fox Sports personality and nationally syndicated columnist
William E. Beard (B.A. 1893) – journalist, war correspondent, naval historian
Roy Blount Jr. (B.A 1963) – humorist, sportswriter, and author
Mel Bradford (Ph.D 1962) – paleoconservative political commentator
David Brinkley – broadcast journalist, NBC and ABC; Emmy and Peabody Award winner; Presidential Medal of Freedom (1992)
Samuel Ashley Brown (Ph.D 1958) – founder of the literary magazine Shenandoah
Innis Brown (B.A. 1906) – sporting editor of The Atlanta Journal, Rhodes Scholar
Deena Clark (M.A.) – television news reporter and journalist, The Deena Clark Show on CBS
Lorianne Crook (B.A. 1978) – radio and television host, co-host of Crook & Chase
Terrance Dean (M.A., Ph.D.) – former MTV executive and author of Hiding in Hip-Hop
Alonso Duralde (B.A. 1988) – senior film critic, The Wrap; syndicate writer, Reuters
Linda Ellerbee (A&S 1962–64) – American journalist for NBC News, host of Nick News with Linda Ellerbee
Eric Etheridge (B.A. 1979) – first editor of George magazine; author, Breach of Peace (2008)
Frye Gaillard (B.A. 1968) – former editor at The Charlotte Observer
Willie Geist (B.A. 1997) – humorist and host on NBC's Today, anchor of Sunday Today with Willie Geist, co-anchor of MSNBC's Morning Joe
Laurentino Gomes – Brazilian journalist and writer, author of 1808 and 1822
John Steele Gordon (B.A. 1966) – business and finance writer, Wall Street Journal contributor
Fred Graham (LL.B 1959) – chief anchor and managing editor of the former Court TV, legal correspondent for the New York Times, and CBS News
Clint Grant – photojournalist featured in Paris Match, Newsweek, Time, and Life, covered the assassination of John F. Kennedy
Amelia Greenhall (B.E. 2009) – co-founder and executive director of Double Union, tech blogger
George Zhibin Gu – Chinese political and economic journalist
Alex Heard (B.A. 1980) – editorial director of Outside magazine; editor and writer for The New York Times Magazine, The New Republic, The Washington Post and Slate
Molly Henneberg (B.S. 1995) – correspondent, Fox News
Hunter Hillenmeyer (B.A. 2003) – financial columnist for TheStreet.com
Henry Blue Kline (M.A. 1929) – member of the Southern Agrarians
Joshua Kors (J.D. 2016) – investigative reporter on military and veterans' issues for CNN, PBS, ABC News, and BBC
Hildy Kuryk (B.A. 1999) – director of communications, Vogue; former national finance director, Democratic National Committee
Paul Lakeland (Ph.D 1981) – British author, contributing blogger to The Huffington Post and a contributing writer to Commonweal
Jincey Lumpkin (B.A. 2002) – producer and columnist for the Huffington Post, named one of the 100 most influential gay people by Out Magazine
Andrew Maraniss (B.A. 1992) – author of Strong Inside: Perry Wallace and the Collision of Race and Sports in the South
Katie McCall (B.A. 1997) – American television journalist
Ralph McGill (B.A. 1916) – anti-segregationist Atlanta Constitution editor and publisher, 1959 Pulitzer Prize for Editorial Writing
Don McNay (M.A.) – financial author and The Huffington Post contributor
Buster Olney (B.A. 1988) – ESPN baseball writer, former sportswriter for The New York Times
Richard Quest – British reporter, anchor for CNN International
Wendell Rawls, Jr. (B.A. 1970) – journalist at The Philadelphia Inquirer and The New York Times, 1977 Pulitzer Prize for Investigative Reporting
Grantland Rice (B.A. 1901) – sportswriter, Atlanta Journal, Cleveland News, New York Tribune; namesake, Grantland Rice Trophy
Fred Russell (B.A. 1927) – sportswriter, Golden Era of Sports, Saturday Evening Post
Christine Sadler* (B.A. 1927) – pioneer female journalist; reporter and Sunday editor, The Washington Post; Washington D.C. editor, McCall's
Jeffrey D. Sadow (Ph.D 1985) – political scientist, columnist
Sebastião Salgado (M.A. 1968) – Brazilian social documentary photographer and photojournalist, UNICEF Goodwill Ambassador, Académie des Beaux-Arts
James Sandler (M.S. 2012) – investigative journalist, New York Times, PBS Frontline; 2004 Pulitzer Prize for Public Service (team)
Edward Schumacher-Matos (B.A. 1968) – former ombudsman, NPR; reporter; The New York Times and The Wall Street Journal; op-ed columnist, The Washington Post; 1980 Pulitzer Prize (team)
John Seigenthaler – founding editorial director of USA Today, First Amendment rights advocate, founder of the First Amendment Center
Elaine Shannon (B.A. 1968) – investigative journalist, former political correspondent for Newsweek and Time
Jim Squires (B.A. 1966) – former editor of the Chicago Tribune
James G. Stahlman (B.A. 1916) – publisher of the Nashville Banner, philanthropist, Maria Moors Cabot Prize winner
Bill Steltemeier (B.A., J.D.) – founding president of the Eternal Word Television Network (EWTN)
Clay Travis (J.D. 2004) – sportswriter, radio host, and analyst on Fox Sports
William Ridley Wills (B.A. 1956) – novelist, poet and journalist, member of the Fugitive group, Sunday Editor for the New York World
Edwin Wilson (B.A. 1950) – theater critic for The Wall Street Journal (1972–1994), former president of the New York Drama Critics' Circle
E. Thomas Wood (B.A. 1986) – author and journalist
Law
Attorneys
Lawrence Barcella (J.D. 1970) – criminal defense lawyer, Assistant United States Attorney for the District of Columbia, lead counsel for the House October Surprise Task Force
Lucius E. Burch Jr. (B.A. 1930, J.D. 1936) – American attorney, best known for his contributions to conservation, civil rights movement and attorney for Martin Luther King Jr.
Donald Q. Cochran (B.A. 1980, J.D. 1992) – United States Attorney for the United States District Court for the Middle District of Tennessee
Bobby Lee Cook – defense attorney, inspiration for the television series Matlock main character Ben Matlock, which starred Andy Griffith as a Georgia attorney.
Hickman Ewing (B.A. 1964) – United States attorney, special prosecutor who oversaw the Whitewater investigation
Zachary T. Fardon (B.A. 1988, J.D. 1992) – United States Attorney for the Northern District of Illinois, U.S. Attorney in Chicago, appointed by Barack Obama
Alice S. Fisher (B.A. 1989) – Managing Partner of the Washington, D.C. office of Latham & Watkins LLP., former Assistant Attorney General for the Criminal Division of the US Department of Justice
Sylvan Gotshal (B.A. 1917) – American lawyer, known for his advocacy of industrial design rights, founding partner of Weil, Gotshal & Manges
Margie Pitts Hames (J.D. 1961) – American civil rights lawyer who argued the abortion rights case Doe v. Bolton before the U.S. Supreme Court
Marci Hamilton (B.A. 1979) – lawyer, won Boerne v. Flores (1997), Constitutional law scholar, Fox Family Pavilion Distinguished Scholar at the University of Pennsylvania
Robert J. Kabel (J.D. 1972) – attorney and lobbyist with Faegre Baker Daniels LLP, involved in developing the Gramm–Leach–Bliley Act (1999) and the Dodd-Frank Act (2010)
Jack Kershaw (B.A. 1935) – attorney and sculptor who represented James Earl Ray
James C. Kirby (B.A. 1950) – former chief counsel to the U.S. Senate Judiciary Subcommittee on the Constitution, co-authored the 25th Amendment to the United States Constitution
Charles M. La Follette (J.D.) – Deputy Chief of Counsel for the post-World War II Nuremberg Trials (1947)
Alice Martin (B.S. 1978) – former United States Attorney who amassed 140 public corruption convictions and collected approximately $750M in qui tam healthcare fraud settlements
Emmett McAuliffe (J.D. 1983) – American intellectual property and entertainment lawyer
James F. Neal (J.D. 1957) – trial lawyer, Watergate prosecutor who prosecuted Jimmy Hoffa and top officials of the Nixon Administration, special investigator of the Abscam and Iran-contra scandals
John Randolph Neal Jr. (LL.B 1896) – American attorney, best known for his role as chief counsel during the 1925 Scopes trial
Neil Papiano (LL.B 1961) – American lawyer, and managing partner of Iverson, Yoakum, Papiano & Hatch
Michelle M. Pettit (J.D. 2001) – Assistant United States Attorney from California, National Security and Cybercrimes Section
Sam C. Pointer Jr. (A.B. 1955) – attorney in Birmingham, Alabama and a United States District Judge for Northern Alabama, noted figure in complex multidistrict class-action litigation
William Bradford Reynolds (LL.B 1967) – Assistant Attorney General in charge of the US Department of Justice's Civil Rights Division (1981–1988)
Ronald J. Rychlak (J.D. 1983) – American lawyer, jurist, and political commentator
Jack Thompson (J.D. 1976) – Vanderbilt Law School, disbarred attorney and activist against obscenity and violence in media and entertainment
Horace Henry White (B.A. 1886, LL.B 1887) – American lawyer, authored legal volumes White's Notarial Guide and White's Analytical Index
Walton J. Wood – American attorney and jurist who served as the first public defender in United States history (1914–1921)
Jurists
Tamara W. Ashford (J.D. 1994) – Article I Judge of the United States Tax Court
Jennings Bailey (B.L. 1890) – District Judge for the United States District Court for the District of Columbia
Jeffrey S. Bivins (J.D. 1986) – Chief Justice of the Supreme Court of Tennessee
Claria Horn Boom (J.D. 1994) – United States District Judge of the United States District Court for Eastern and Western Kentucky
John P. Bourcier (J.D. 1953) – former justice of the Rhode Island Supreme Court
John K. Bush (B.A. 1986) – U.S. Circuit Court Judge, United States Court of Appeals for the 6th Circuit (2017–present)
Charles Hardy Carr (B.A. 1925) – United States District Judge of the United States District Court for the Southern District of California and Central California
Albert M. Clark (LL.B 1900) – Justice of the Supreme Court of Missouri
Cornelia Clark (B.A. 1971) – Justice of the Supreme Court of Tennessee
Elijah Allen Cox (B.A. 1909) – federal judge for the United States District Court for the Northern District of Mississippi
Waverly D. Crenshaw Jr. (J.D. 1981) – Chief Judge of the United States District Court for the Middle District of Tennessee
Larry Creson (LL.B 1928) – former justice of the Supreme Court of Tennessee
Frank P. Culver Jr. (B.A. 1911) – former justice of the Supreme Court of Texas
Martha Craig Daughtrey (B.A. 1964) – senior United States Circuit Judge of the United States Court of Appeals for the Sixth Circuit
Frank Drowota (B.A. 1960, J.D. 1965) – former chief justice of the Supreme Court of Tennessee
Eric Eisnaugle (J.D. 2003) – Judge of the Florida Fifth District Court of Appeal
Julia Smith Gibbons (B.A. 1972) – United States Circuit Judge of the United States Court of Appeals for the Sixth Circuit
S. Price Gilbert (B.S. 1883) – former associate justice of the Supreme Court of Georgia
David J. Hale (B.A. 1982) – United States District Judge of the United States District Court for the Western District of Kentucky
William Joseph Haynes Jr. (J.D. 1973) – former United States District Judge of the United States District Court for the Middle District of Tennessee
Thomas Aquinas Higgins (B.A. 1954, LL.B 1957) – United States District Judge of the United States District Court for the Middle District of Tennessee
John W. Holland (LL.B 1906) – former United States District Judge of the United States District Court for the Southern District of Florida
Andrew O. Holmes (B.S. 1927, LL.B. 1929) – Justice of the Tennessee Supreme Court
Marcia Morales Howard (B.S. 1987) – United States District Judge of the United States District Court for the Middle District of Florida
Oscar Richard Hundley (LL.B 1877) – United States Federal Judge by recess appointment from President Theodore Roosevelt
Albert C. Hunt (LL.B 1909) – former associate justice of the Supreme Court of Oklahoma
Edwin Hunt (B.A., J.D.) – appellate advocate, Assistant Attorney General, U.S. checkers champion (1934)
Daniel E. Hydrick (B.A. 1882) – former associate justice of the Supreme Court of South Carolina
Alan Bond Johnson (B.A. 1961) – United States District Judge of the United States District Court for the District of Wyoming
William F. Jung (B.A. 1980) – United States District Judge of the United States District Court for the Middle District of Florida
Jeremy Kernodle (J.D. 2001) – United States District Judge of the United States District Court for the Eastern District of Texas
William C. Koch Jr. (J.D. 1972) – former justice of the Supreme Court of Tennessee
W. H. Kornegay (LL.B 1890) – former associate justice of the Oklahoma Supreme Court, delegate to Oklahoma Constitutional Convention
James C. Mahan (J.D. 1973) – senior United States District Judge of the United States District Court for the District of Nevada
Jon Phipps McCalla (J.D. 1974) – senior United States District Judge of the United States District Court for the Western District of Tennessee
Leon Clarence McCord (Law, 1900) – senior United States Circuit Judge of the United States Court of Appeals for the Fifth Circuit
Travis Randall McDonough (J.D. 1997) – United States District Judge of the United States District Court for the Eastern District of Tennessee
Robert Malcolm McRae Jr. (B.A. 1943) – former United States District Judge of the United States District Court for the Western District of Tennessee
James Clark McReynolds (B.A. 1882) – Supreme Court Justice (1914–1941); Assistant Attorney General (1903–1907)
Gilbert S. Merritt Jr. (LL.B 1960) – lawyer and jurist, senior United States Circuit Judge of the United States Court of Appeals for the Sixth Circuit
Edward H. Meyers (B.A. 1995) – United States Federal Judge of the United States Court of Federal Claims
Benjamin K. Miller (J.D. 1961) – former chief justice of the Illinois Supreme Court
Brian Stacy Miller (J.D. 1995) – Chief United States District Judge of the United States District Court for the Eastern District of Arkansas
John Musmanno (J.D. 1966) – senior judge of the Pennsylvania Superior Court
John Trice Nixon (LL.B 1960) – senior United States District Judge of the United States District Court for the Middle District of Tennessee
Tom Parker (J.D.) – Chief Justice of the Alabama Supreme Court
Tommy Parker (J.D. 1989) – United States District Judge of the United States District Court for the Western District of Tennessee
Marlin T. Phelps (J.D.) – former chief justice of the Supreme Court of Arizona
Thomas W. Phillips (J.D. 1969) – senior United States District Judge of the United States District Court for the Eastern District of Tennessee
Jonathan Pittman (J.D. 1990) – Associate Judge of the Superior Court of the District of Columbia
Sam C. Pointer Jr. (A.B. 1955) – attorney in Birmingham, Alabama and a United States District Judge for Northern Alabama, noted figure in complex multidistrict class-action litigation
Juan Ramirez Jr. (B.A. 1968, M.A. 1969) – former chief judge for the Florida Third District Court of Appeal
Eli J. Richardson (J.D. 1992) – United States District Judge of the United States District Court for the Middle District of Tennessee
Jay Richardson (B.S. 1999) – U.S. Circuit Court Judge, United States Court of Appeals for the 4th Circuit (2018–present)
Kevin H. Sharp (J.D. 1993) – United States District Judge of the United States District Court for the Middle District of Tennessee
Eugene Edward Siler Jr. (B.A. 1958) – U.S. Circuit Court Judge, United States Court of Appeals for the 6th Circuit
Jane Branstetter Stranch (J.D. 1978) – Order of the Coif, United States Circuit Judge of the United States Court of Appeals for the Sixth Circuit
Sarah Hicks Stewart (J.D. 1992) – Associate Justice of the Supreme Court of Alabama
Aleta Arthur Trauger (M.A. 1972) – United States District Judge of the United States District Court for the Middle District of Tennessee
Emory Marvin Underwood (B.A. 1900) – Senior United States District Judge of the United States District Court for the Northern District of Georgia
Thomas A. Varlan (J.D. 1981) – Chief United States District Judge of the United States District Court for the Eastern District of Tennessee
Roger Vinson (J.D. 1971) – senior United States District Judge of the United States District Court for the Northern District of Florida, former member of the United States Foreign Intelligence Surveillance Court
Harry W. Wellford (LL.B 1950) – Senior United States Circuit Judge of the United States Court of Appeals for the Sixth Circuit
Samuel Cole Williams (LL.B 1884) – noted 19th and 20th century Tennessee jurist, historian, educator, and businessman
Billy Roy Wilson (J.D. 1965) – Senior United States District Judge of the United States District Court for the Eastern District of Arkansas
Thomas A. Wiseman Jr. (B.A. 1952, J.D. 1954) – Senior Judge of the United States District Court for the Middle District of Tennessee
Staci Michelle Yandle (J.D. 1987) – United States District Judge of the United States District Court for the Southern District of Illinois
Military
Spence M. Armstrong (transferred to Navy) – United States Air Force Lieutenant General, Defense and Air Force Distinguished Service Medal, NASA Exceptional Service Medal recipient
Archibald Vincent Arnold (M.A.) – United States Army Major General, 7th Infantry Division during World War II, Army Distinguished Service Medal, former Military Governor of Korea
Henry L. Brandon (J.D.) – United States Naval Aviator, Corsair Fighter-Bomber Squadron VBF-82
Kendall L. Card (B.E. 1977) – United States Navy Vice Admiral, 64th director of Naval Intelligence, Defense Superior Service Medal recipient
Michael Bruce Colegrove (D.Phil.) – former colonel in the U.S. Army Reserve, 5th president of the Hargrave Military Academy
Don Flickinger (M.D. 1934) – United States Air Force Brigadier General, aerospace medicine pioneer; Commander, Air Force Office of Scientific Research, Distinguished Service Medal
Evelyn Greenblatt Howren – pioneering female aviator, first class of Women Airforce Service Pilots in World War II
Tramm Hudson (B.A. 1975) – United States Army Lieutenant Colonel, 3rd Infantry Division
Claiborne H. Kinnard Jr. (B.E. 1937) – United States Army Air Force decorated World War II fighter ace, 355th Fighter Group, Distinguished Service Cross
William J. Livsey (M.S. 1964) – United States Army Four-Star General, Commander in Chief of United Nations Command, Defense and Army Distinguished Service Medal recipient
John Mazach (B.A. 1966) – United States Navy Vice Admiral, Commander of the Naval Air Force Atlantic
Barbara S. Pope (B.A. 1972) – United States Assistant Secretary of the Navy
William Estel Potts (B.A. 1958) – United States Army Major General, Army Distinguished Service Medal, 22nd Chief of Ordnance for the U.S. Army Ordnance Corps, U.S. Army Ordnance Corps Hall of Fame
Jack Reed (B.A. 1947) – United States Army, Signal Intelligence Service during World War II
William "Rip" Robertson – United States Marine Corps Captain in the Pacific Theater, World War II, Paramilitary Operations Officer for the CIA's Special Activities Division, CIA Case Officer
Maritza Sáenz Ryan (J.D. 1988) – United States Army Colonel, first female and Hispanic head of the Department of Law at the United States Military Academy
Evander Shapard (LL.B 1917) – Royal Air Force World War I flying ace, 92 Squadron, six victories flying the S.E.5a, British Distinguished Flying Cross
William Ruthven Smith – United States Army Major General, Superintendent of the United States Military Academy, Distinguished Service Medal recipient
Nora W. Tyson (B.A. 1979) – United States Navy Vice Admiral, Legion of Merit, first woman to lead a U.S. Navy ship fleet
Volney F. Warner (M.A. 1959) – United States Army Four-Star General, Commander-in-Chief, United States Readiness Command (1979–1981), Defense Distinguished Service Medal recipient, coined the phrase "boots on the ground"
Ministry and religion
Arto Antturi – Finnish Lutheran priest, vicar for the parish of Pitäjänmäki
T. C. Chao (M.A. 1916, B.D. 1917) – one of the leading Christian theological thinkers in China in the early twentieth century
James L. Crenshaw (Ph.D 1964) – Robert L. Flowers Professor of the Old Testament at Duke University, leading scholar in Old Testament Wisdom literature, Guggenheim Fellow
The Rt. Rev. Jane Dixon (B.A., M.A.T.) – Suffragan Bishop of the Episcopal Diocese of Washington, second female bishop of the Episcopal Church
Musa Dube (Ph.D. 1997) – Botswana feminist theologian, 2011 Humboldt Prize winner
The Rt. Rev Robert W. Estill (D.Min 1980) – 9th bishop of the Episcopal Diocese of North Carolina
Robert W. Funk (Ph.D 1953) – American biblical scholar, founder of the Jesus Seminar and the nonprofit Westar Institute, Guggenheim Fellow, Fulbright Scholar
William M. Greathouse – minister and emeritus general superintendent in the Church of the Nazarene
William J. Hadden (M.Div 1946) – Episcopal university chaplain, U.S. Army chaplain, U.S. Navy chaplain; desegregationist, World War II's V-12 Navy College Training Program at Vanderbilt
Charles Robert Hager (M.D. 1894) – Swiss-American missionary, founder of the China Congregational Church in Hong Kong, baptized Sun Yat-sen, first president of the Republic of China
John Wesley Hardt – Bishop of the United Methodist Church, author, and biographer
William S. Hatcher (B.A. 1957, M.A. 1958) – mathematician, philosopher; served on several National Spiritual Assemblies; wrote several books on the Baháʼí Faith after his 1957 conversion at Vanderbilt
The Rt. Rev. Susan Bunton Haynes (M.Div 1993) – 11th Bishop of the Episcopal Diocese of Southern Virginia
William G. Johnsson (Ph.D) – Seventh-day Adventist author, former editor of the Adventist Review
Yung Suk Kim (Ph.D 2006) – Korean-American biblical scholar and author, editor of the Journal of Bible and Human Transformation and the Journal of Race, Ethnicity, and Religion
Walter Russell Lambuth (M.D. 1877) – recipient of theology and medical degrees from Vanderbilt; Methodist missionary to China, Japan and Africa; later Bishop of the Methodist Episcopal Church, South
John H. Leith (M.A. 1946) – Presbyterian theologian and ordained minister, authored at 18 books on Christianity
Tat-Siong Benny Liew (M.A. 1994, Ph.D. 1997) – 1956 chair of New Testament Studies at the College of the Holy Cross
Robert McIntyre – Scottish-born American Bishop of the Methodist Episcopal Church
Mark A. Noll (Ph.D 1975) – progressive evangelical scholar, historian at the University of Notre Dame
Carroll D. Osburn (D.Div 1970) – American scholar recognized as one of North America's leading New Testament textual critics and a prominent Christian egalitarian
Mitch Pacwa (Ph.D) – bi-ritual American Jesuit priest celebrating liturgy in both the Roman and Maronite rites, president and founder of Ignatius Productions, accomplished linguist
William Powlas Peery (M.A. 1959) – Pastor of the Andhra Evangelical Lutheran Church in Andhra Pradesh, India, significant figure in South Indian Christianity in the 20th century
David Penchansky (Ph.D 1988) – scholar of the Hebrew Bible, literary critic to the Old Testament, particularly its Wisdom Literature
Clare Purcell (B.D. 1916) – American Methodist bishop
The Rt. Rev. Sidney Sanders (B.A. 1952) – 6th Bishop of the Episcopal Diocese of East Carolina
Laurel C. Schneider (Ph.D. 1997) – professor of religious studies, religion and culture at the Vanderbilt Divinity School
Timothy F. Sedgwick (M.A., Ph.D) – American Episcopal ethicist
Ken Stone (M.A. 1992, Ph.D 1995) – author, chairman of the Reading, Theory and the Bible Section of the Society of Biblical Literature, Lambda Literary Award winner
Thomas B. Warren (M.A., Ph.D) – Restorationist philosopher and theologian
B. Michael Watson (D.M) – bishop of The United Methodist Church
Sharon D. Welch (Ph.D. 1982) – social ethicist and author; Affiliate Faculty, Meadville Lombard Theological School; former Associate Professor, Harvard Divinity School
Walter Ziffer (B.E. 1954) – Czech-born Holocaust survivor, theologian, scholar, and author
Science, mathematics, and engineering
Mary Jo Baedecker (B.S. 1964) – geochemist, established the Toxic Substances Hydrology Program at the United States Geological Survey, Department of the Interior Distinguished Service Award, Meinzer Award
Edward Emerson Barnard (B.A. 1887) – astronomer who discovered Barnard's star, Jupiter's fifth moon, nearly a dozen comets, and nebulous emissions in supernovae
James L Barnard (Ph.D 1971) – South African engineer, pioneer of biological nutrient remover, a non-chemical means of water treatment to remove nitrogen and phosphorus from used water
Laura P. Bautz (B.S. 1961) – astronomer who created the Bautz–Morgan classification of galaxy clusters; Professor, Northwestern University; director, Astronomical Science, National Science Foundation
Bob Boniface (B.A. 1987) – automobile and industrial designer, director, Global Buick exterior design, director, Cadillac exterior design
Sylvia Bozeman (M.S. 1970) – American mathematician whose research on functional analysis and image processing has been funded by the Army Research Office, National Science Foundation, and NASA
Kimberly Bryant (B.E. 1989) – biotechnologist for Genentech, Novartis Vaccines, Diagnostics, and Merck, founder of Black Girls Code
Charles R. Chappell (B.A. 1965) – NASA astronaut, former mission scientist for Spacelab 1, two-time NASA Exceptional Scientific Achievement Medal winner
Yvonne Clark (M.S. 1972) – pioneer for African-American and women engineers, worked for NASA, Westinghouse, and Ford
Baratunde A. Cola (B.E 2002, M.S. 2004) – scientist and engineer specializing in carbon nanotube technology, Alan T. Waterman Award winner
Shirley Corriher (B.A. 1959) – biochemist and author
William A. Davis Jr. (B.E. 1950) – engineer and distinguished leader in Ballistic Missile Defense (BMD) for the United States Army
John H. DeWitt Jr. (B.E. 1928) – pioneer in radio broadcasting, radar astronomy and photometry, observed the first successful reception of radio echoes off the moon on January 10, 1946, as part of Project Diana
Nathaniel Dean (Ph.D. 1987) – American mathematician who has made contributions to abstract and algorithmic graph theory, as well as data visualization and parallel computing
Harry George Drickamer – pioneer experimentalist in high-pressure studies of condensed matter, 1974 Irving Langmuir Award, 1989 National Medal of Science
Eric Eidsness (B.E. 1967) – engineer, EPA administrator, wrote the EPA's first environmental impact statement (EIS) established the EPA's water quality standards
Lawrence C. Evans (B.A. 1971) – noted mathematician in the field of nonlinear partial differential equations, proved that solutions of concave, fully nonlinear, uniformly elliptic equations are , National Academy of Sciences
Jordan French (B.E. 2007) – engineer and 3D food printing pioneer, founding CMO of BeeHex, Inc.
Fumiko Futamura (Ph.D 2007) – mathematician known for her work on the mathematics of perspective, 2018 Carl B. Allendoerfer Award
Kenneth Galloway (B.A. 1962) – American engineer researching solid-state devices, semiconductor technology, and radiation effects in electronics, IEEE Fellow
Mai Gehrke (Postdoc) – Danish mathematician on the theory of lattices at the Centre national de la recherche scientifique (CNRS)
Michael L. Gernhardt (B.S. 1978) – NASA astronaut and principal investigator of the Prebreathe Reduction Program at the Lyndon B. Johnson Space Center
G. Scott Hubbard (B.S. 1970) – former director of NASA's Ames Research Center, chairman SpaceX Safety Advisory Panel, restructured the Mars program in the wake of mission failures
Snehalata V. Huzurbazar (M.A. 1988) – American statistician, known for her work in statistical genetics, and applications of statistics to geology, Elected Fellow of the American Statistical Association
Jedidah Isler – American astrophysicist, expert on blazars (supermassive black holes) and the astrophysical jet streams emanating from them
Param Jaggi – American inventor, invented Algae Mobile, a device that converts emitted from cars into oxygen, CEO of Hatch Technologies, founder and CEO of EcoViate, Forbes 30 Under 30
Carl Jockusch (A&S 1959) – American mathematician who proved (with Robert I. Soare) the low basis theorem, with applications to recursion theory and reverse mathematics
Steven E. Jones (Ph.D 1978) – physicist, known for his long research on muon-catalyzed fusion and geo-fusion
Michael Kearney (M.E. 2002) – youngest person in world history to attain a college degree, having done so at the age of ten; studied computer science at Vanderbilt
Betty Klepper (B.A. 1958) – USDA scientist at Rhizotron, co-authored more than 200 scientific publications; first female editor, Crop Science; first female fellow, SSSA; first female President, CSSA
Karen Kohanowich (B.S. 1982) – Undersea Technology Officer for the Office of Ocean Exploration and Research at the National Oceanic and Atmospheric Administration, aquanaut on the NASA Extreme Environment Mission Operations
Duncan Leitch (B.S. 2006, Ph.D 2013) – neurobiologist who gained recognition for his work on the integumentary sensory organs in crocodilians
William R. Lucas (M.S., Ph.D) – 4th director of the NASA Marshall Space Flight Center
Ashwin Mahesh (M.S. 1993) – Indian urbanist, journalist, politician and social technologist, climate scientist at NASA
Dennis Mammana (M.S.) – astronomy writer and sky photographer
Jennifer R. Mandel (Ph.D 2008) – plant biologist researching plant population, quantitative genetics, evolutionary genetics, and phylogenetics
James Cullen Martin (M.S. 1952) – chemist, responsible for the hexafluorocumyl alcohol derived "Martin" bidentate ligand and a tridentate analog, co-invented the Dess–Martin periodinane, creator of the Martin sulfurane
Emil Wolfgang Menzel Jr. (Ph.D 1958) – primatologist whose research laid the foundation for the contemporary understanding of communication and cognition in chimpanzees
Ronald E. Mickens (Ph.D 1968) – American physicist specialized in nonlinear dynamics and mathematical modeling with significant contributions to the theory of nonlinear oscillations and numerical analysis
James O. Mills (B.A. 1984) – archaeologist known for his work in paleopathology, excavations at Nekhen (Hierakonpolis), the capital of Upper Egypt in the late 4th millenniumBC, ancient Egypt's Protodynastic Period
Stanford Moore (B.A. 1935) – protein chemist, inventor of a method for sequencing proteins, winner of the 1972 Nobel Prize in Chemistry
Edward Craig Morris (B.A. 1961) – American archaeologist whose Inca expeditions created a modern understanding of the Inca civilization, chair of Department of Anthropology at the American Museum of Natural History
Thiago David Olson (B.E. 2011) – electrical engineer and entrepreneur who created a homemade nuclear fusion reactor at age 17, electrical engineer at the U.S. Department of Defense, co-founder and CEO of Stratos Technologies, Inc.
Mendel L. Peterson (M.A. 1940) – pioneer of underwater archeology and former curator at the Smithsonian Institution, known as "the father of underwater archeology;" namesake of Peterson Island in Antarctica
Dorothy J. Phillips (B.A. 1967) – pioneering African-American chemist known for work on circular dichroism and bioseparation, director-at-Large of the American Chemical Society
Polly Phipps (M.A.) – American social statistician, Senior Survey Methodologist at the US Bureau of Labor Statistics
Philip Thomas Porter (B.A. 1952, M.A. 1953, Ph.D) – electrical engineer and one of the guiding pioneers of the invention and development of early cellular telephone networks
Joseph Melvin Reynolds (B.A. 1946) – physicist, first observation of Landau quantum oscillation in the Hall effect, first detection of LQO in Knight shift, NASA consultant, Guggenheim Fellow
George G. Robertson – senior researcher, Visualization and Interaction Research Group, Microsoft Research
Amy Rosemond (Ph.D 1993) – aquatic ecosystem ecologist and biogeochemist who advanced the understanding of how nutrients affect energy flow in detritus-based food webs, Ecological Society of America Fellow
J. Robert Sims (B.S. 1963) – American chemical, mechanical engineer, former research engineer at ExxonMobil, inventor, former president of the American Society of Mechanical Engineers
Ruth Stokes (M.A. 1923) – American mathematician, cryptologist, and astronomer who made pioneering contributions to the theory of linear programming; founder of Pi Mu Epsilon
John Ridley Stroop (B.S. 1924, M.A. 1925, Ph.D 1933) – psychologist known for discovering the Stroop effect, a psychological process related to word recognition, color and interference
James R. Thompson (B.S. 1960) – American statistician known for biomathematically modeling HIV, AIDS, and cancer
Bruce J. Tromberg (B.A. 1979) – American photochemist and a leading researcher in the field of biophotonics
Douglas Vakoch – American astrobiologist, search for extraterrestrial intelligence (SETI) researcher, president of METI (Messaging Extraterrestrial Intelligence)
Davita Watkins (B.S. 2006) – American chemist developing supramolecular synthesis methods to make new organic semiconducting materials for applications in optoelectronic devices
Marsha Rhea Williams (Ph.D. 1982) – first African-American woman to earn a computer science Ph.D., National Science Foundation fellow
Medicine
Alejandro Sánchez Alvarado (B.S. 1986) – Venezuelan molecular biologist and an investigator of the Howard Hughes Medical Institute
Jean R. Anderson (M.D.) – internationally recognized obstetrician and gynaecologist, founder and first director of the Johns Hopkins Hospital HIV Women's Health Program (1991)
Humphrey Bate (M.D. 1898) – American physician and musician who served as a surgeon in the Spanish–American War (1898)
Eugene Lindsay Bishop (M.D. 1914) – director of health and safety, TVA, whose studies and control programs for malaria earned him a Lasker Award (1950)
Daniel Blain (M.D. 1929) – first medical director of the American Psychiatric Association (APA)
Ogden Bruton (M.D. 1933) – made significant advances in immunology,<ref>Biography of Ogden Carr Bruton, National Library of Medicine Ogden C. Bruton Papers 1925-1994</</ref> discovered Bruton-type agammaglobulinemia, namesake of Bruton's tyrosine kinase
Thomas C. Butler (M.D. 1967) – American scientist specializing in infectious diseases including cholera and bubonic plague, credited with making oral hydration the standard treatment for diarrhea
David Charles (B.S. 1986, M.D. 1990) – neurologist, Chief Medical Officer of the Vanderbilt Neuroscience Institute, director of telemedicine at Vanderbilt University Medical Center
Alice Drew Chenoweth (M.D. 1932) – physician who specialized in pediatrics and public health, served as the Chief of the Division of Health Services in the United States Children's Bureau
Robert D. Collins (B.A. 1948, M.D. 1951) – American physician and pathologist who established the Lukes–Collins scheme for pathologic classification of lymphoma
Katherine Cullen (Ph.D. 1995) – American biologist whose work provided direct evidence that the larger three-dimensional structure of the genome is related to its function
Juliet Daniel (Postdoc) – Canadian cancer biologist, discovered and named the protein ZBTB33 "Kaiso" at Vanderbilt in 1996
William H. Dobelle – biomedical researcher and artificial vision pioneer, nominated for the Nobel Prize in Physiology or Medicine in 2003
Allan L. Drash (B.A. 1953) – pediatric endocrinologist, former president of the American Diabetes Association, one of the original describers of the Denys–Drash syndrome
Wilton R. Earle (Ph.D 1928) – American cell biologist known for his research in cell culture techniques and carcinogenesis
Arnold Eskin (B.S) – leader in the discovery of mechanisms underlying entrainment of circadian clocks, developed the heuristic Eskinogram
Francis M. Fesmire (M.D. 1985) – emergency physician and nationally recognized expert in myocardial infarction
J. Donald M. Gass (B.A. 1950, M.D. 1957) – Canadian-American ophthalmologist, one of the world's leading specialists on diseases of the retina, first to describe many macular diseases
Ernest William Goodpasture (B.A. 1908) – American pathologist who invented methods for growing viruses and rickettsiae in fertilized chicken eggs, enabling the development of vaccination, described Goodpasture syndrome
Barney S. Graham (Ph.D. 1991) – chief, Viral Pathogenesis Lab, Vaccine Research Center; co-designed spike protein with Moderna for the COVID-19 vaccine
James Tayloe Gwathmey (M.D. 1899) – physician and pioneer of early anesthetic devices for medical use, hailed as the "Father of Modern Anesthesia"
Tinsley R. Harrison – American physician and creator and editor of the first five editions of internal medicine textbook Harrison's Principles of Internal Medicine
Tina Hartert (M.D., M.P.H) – Lulu H. Owen Endowed Chair in Medicine, Vanderbilt University; leader, Human Epidemiology and Response to SARS (HEROS) study, National Institutes of Health
Richard Hatchett (B.A. 1989, M.D. 1995) – CEO of Coalition for Epidemic Preparedness Innovations, Secretary of Health and Human Services Distinguished Service Award
Dorothy E. Johnson (B.S. 1942) – nursing theorist, created the Behavioral System Model, a founder of modern system-based nursing theory
Robb Krumlauf (B.E. 1970) – American developmental biologist best known for his progression of the understanding of Hox genes
Zenas Sanford Loftis (B.S. 1901) – physician, medical missionary to Tibet
Louis Lowenstein (B.A., M.D.) – medical researcher who made significant contributions in hematology and immunology
Tom Maniatis (Ph.D) – professor of molecular and cellular biology known for the development and application of gene cloning methods to the study of molecular biology
John Owsley Manier (B.A. 1907) – American physician, accompanied the Vanderbilt hospital unit to Fort McPherson in 1917
G. Patrick Maxwell (M.D.) – plastic surgeon, first successful microsurgical transfer of the latissimus muscle flap at Johns Hopkins University, advanced the design of tissue expanders
H. Houston Merritt (B.S. 1922) – pioneering neurologist who discovered the anticonvulsant properties of phenytoin (Dilantin), which ushered in the modern era of drug therapy for epilepsy
Hugh Jackson Morgan (B.A. 1914) – former chair the Department of Medicine at Vanderbilt, former president of the American College of Physicians
Harold L. Moses (M.D. 1962) – Ingram Professor of Cancer Research, professor of cancer biology, medicine and pathology, and director emeritus at the Vanderbilt-Ingram Cancer Center, president of the American Association for Cancer Research (1991)
Sharlene Newman (B.E. 1993) – pioneered use of neuroimaging and functional magnetic resonance imaging to study language processing in the human brain
George C. Nichopoulos (M.D. 1959) – American physician best known as Elvis Presley's personal physician
Jodi Nunnari (Ph.D) – cell biologist and pioneer in the field of mitochondrial biology, editor-in-chief The Journal of Cell Biology, president-elect of the American Society for Cell Biology
Lacy Overby (B.A. 1941, M.S. 1945, Ph.D 1951) – virologist known for his contributions to Hepatitis B and Hepatitis C research
William A. Pusey (B.A. 1885) – American physician and past president of the American Medical Association, expert in the study of syphilis, authored the first history of dermatology in English
Sanford Rosenthal (M.D. 1920) – pioneered liver function tests, discovered rongalite as the antidote for mercury poisoning, discovered an antibiotic cure for pneumococcal pneumonia, Public Health Service Meritorious Service Medal (1962)
Samuel Santoro (M.D./Ph.D 1979) – pioneering researcher in the structure of integrin adhesive receptors for extracellular matrix proteins, chair of the Department of Pathology, Microbiology and Immunology at Vanderbilt
Robert Taylor Segraves (B.A. 1963, M.D. 1971) – American psychiatrist best known for his work on sexual dysfunction and its pharmacologic causes and treatments
Karen Seibert (Ph.D.) – pharmacological scientist, discoverer of celecoxib, instrumental in the elaboration of the COX-2 inflammatory pathway
Hrayr Shahinian – American skull base surgeon and founder of the Skull Base Institute (SBI)
Norman Shumway (M.D. 1949) – 67th president of the American Association for Thoracic Surgery and the first to perform a successful heart transplant in the United States
John Abner Snell (M.D. 1908) – missionary surgeon and hospital administrator in Suzhou (Soochow), China
Sophie Spitz (M.D. 1932) – pathologist who published the first case series of a special form of benign melanocytic nevi that have come to be known as Spitz nevi
Mildred T. Stahlman (B.A. 1943, M.D. 1946) – professor of pediatrics and pathology at Vanderbilt, started the first newborn intensive care unit in the world, winner of the John Howland Award
Ghanshyam Swarup – Indian molecular biologist known for his studies on glaucoma and the discovery of protein tyrosine phosphatase, Shanti Swaroop Bhatnagar laureate
Carol Tamminga (M.D. 1971) – American psychiatrist and neuroscientist focusing in schizophrenia, psychotic bipolar disorder, and schizoaffective disorder, National Academy of Medicine fellow
Robert V. Tauxe (M.D.) – director of the Division of Foodborne, Waterborne and Environmental Diseases of the Centers for Disease Control and Prevention
James C. Tsai (M.B.A. 1998) – president, New York Eye and Ear Infirmary of Mount Sinai, system chair of the Department of Ophthalmology at the Mount Sinai Health System
Krystal Tsosie (MPH, PhD) – American geneticist and bioethicist known for promoting Indigenous data sovereignty and studying genetics within Indigenous communities
Rhonda Voskuhl (M.D.) – physician and research scientist, Brain Research Institute (BRI) at the David Geffen School of Medicine at UCLA, principal investigator for treatment trials for multiple sclerosis (MS)
Peter Walter (M.S. 1977) – German-American molecular biologist and biochemist known for work on unfolded protein response and the signal recognition particle, 2014 Lasker Award, 2018 Breakthrough Prize in Life Sciences winner
Levi Watkins (M.D. 1970) – heart surgeon and civil rights activist; first to successfully implant an automatic defibrillator in a human patient with surgical technologist Vivien Thomas
Logan Wright (Ph.D 1964) – American pediatric psychologist, former president of the American Psychological Association, coined the term pediatric psychology
Li Yang (Ph.D.) – American biologist, Senior Investigator and head of the tumor microenvironment section at the National Cancer Institute
Lynn Zechiedrich (Ph.D 1990) – American biochemist, developed novel approaches to characterize the topography of DNA, National Academy of Inventors (2017)
Notable faculty and staff
Virginia Abernethy, professor emerita of psychiatry and anthropology; population expert; immigration reduction advocate
Douglas Adams, Distinguished Professor of Civil and Environmental Engineering
Akram Aldroubi, professor of mathematics and Fellow of the American Mathematical Society
Sidney Altman, Canadian-American molecular biologist, former researcher in molecular biology at Vanderbilt, 1989 Nobel Prize in Chemistry winner
Igor Ansoff, Russian-American applied mathematician, known as the father of strategic management
Celia Applegate, American scholar, William R. Kenan, Jr. Professor of History, Affiliate Faculty of Musicology and Ethnomusicology
Richard Arenstorf, American mathematician, discovered a stable orbit between the Earth and the Moon (Arenstorf Orbit), which was the basis of the orbit used by the Apollo Program for going to the Moon
Jeremy Atack, research professor emeritus of economics
Nils Aall Barricelli, Norwegian-Italian mathematician whose early computer-assisted experiments in symbiogenesis and evolution are considered pioneering in artificial life research
Larry Bartels, American political scientist, co-director of the Center for the Study of Democratic Institutions and Shayne Chair in Public Policy and Social Science
Eugene Biel-Bienne, Austrian painter, former faculty of the Department of Fine Arts in the College of Arts and Science
Camilla Benbow, Dean of Peabody College at Vanderbilt University, scholar on education of gifted youth
John Keith Benton (1896–1956), Dean of the Vanderbilt University Divinity School, 1939–1956
Lauren Benton, historian known for works on the history of empires, Nelson O. Tyrone, Jr. Professor of History and Professor of Law
Michael Bess, Chancellor's Professor of History, Professor of European Studies, Fulbright scholar, MacArthur Foundation, Woodrow Wilson Fellow
David Blackbourn, British historian, Cornelius Vanderbilt Distinguished Chair of History, Guggenheim Fellow
Alfred Blalock, Professor of Surgery; in the 1930s did pioneering research on traumatic shock, saving countless lives during World War II, multiple nominations for the Nobel Prize in Medicine
Paolo Boffetta, Italian epidemiologist
John D. Boice Jr., Professor of Medicine at Vanderbilt University School of Medicine whose discoveries "have been used to formulate public health measures to reduce population exposure to radiation and prevent radiation-associated diseases"
Eric Bond, economist, Joe L. Roby Professor of Economics
William James Booth, professor of political science, professor of philosophy
Constance Bumgarner Gee, art policy scholar, memoirist; advocate of the medical use of cannabis; former wife of Chancellor Gordon Gee
George Arthur Buttrick, Christian scholar
William Caferro, Gertrude Conaway Vanderbilt Professor of History, 2010 John Simon Guggenheim Memorial Foundation Fellow
John Tyler Caldwell (1911–1991), Professor of Political Science at Vanderbilt University, 1939–1947; chancellor of North Carolina State University 1959–1975
Joy H. Calico, Cornelius Vanderbilt Professor of Musicology at the Blair School of Music, Berlin Prize Winner (2005)
Kenneth C. Catania, neurobiologist, Stevenson Professor of Biological Sciences, MacArthur Fellow (2006)
Jay Clayton, literary critic, William R. Kenan, Jr. Professor of English and director of the Curb Center for Art, Enterprise, and Public Policy
Jeff Coffin, Grammy Award winning saxophonist, member of Dave Matthews Band and Béla Fleck and the Flecktones, faculty of the Blair School of Music
Stanley Cohen, biochemist, discoverer of cellular growth factors, winner of the 1986 Nobel Prize in Physiology or Medicine
Alain Connes, mathematician, Fields Medal Winner (1982)
James C. Conwell, mechanical engineer, president of Rose-Hulman Institute of Technology
Bruce Cooil, Dean Samuel B. and Evelyn R. Richmond Professor of Management at Vanderbilt University in the Owen Graduate School of Management
Tim Corbin, Head Coach, Vanderbilt Commodores Men's Baseball (2003–present). Led Commodores to 2014 National Championship
Margaret Cuninggim, Dean of Women, 1966–1973; namesake of the Margaret Cuninggim Women's Center on campus
Walter Clyde Curry, American academic, medievalist and poet, member of Fugitives, joined the English department in 1915, chair of the English department (1941–1955)
J. Dewey Daane, American economist and the Frank K. Houston Professor of Finance, emeritus and senior advisor, Financial Markets Research Center at Vanderbilt University, Board of Governors of the Federal Reserve
Richard L. Daft, sociologist
Larry Dalton, American chemist best known for his work in polymeric nonlinear electro-optics, introduced the concept of Saturation Transfer Spectroscopy while at Vanderbilt
Kate Daniels, American poet
Donald Davie, British Movement poet and literary critic, author of Purity of Diction in English Verse, Vanderbilt professor (1978–1988)
Colin Dayan, Robert Penn Warren Professor in the Humanities
Max Delbrück, pioneering molecular biologist, winner of the 1969 Nobel Prize in Physiology or Medicine
Arthur Demarest, Ingram Professor of Anthropology, Mesoamerican scholar
Collins Denny (1854–1943), Professor of Philosophy at Vanderbilt until 1911; taught John Crowe Ransom; tried to "impose theological control over the university" when he became Bishop of the Methodist Episcopal Church, South
Jacob M. Dickinson, Professor of Law from 1897 to 1899 while he was an attorney for the Louisville and Nashville Railroad; United States Secretary of War, 1909–1911
Tom Dillehay, American anthropologist, Rebecca Webb Wilson University Distinguished Professor of Anthropology, Religion, and Culture
Tony Earley, novelist
Jesse Ehrenfeld, professor of anesthesiology, surgery, biomedical informatics, and health policy, chair-elect of the American Medical Association, leading researcher in the field of biomedical informatics
Mark Ellingham, professor of mathematics, discoverer and namesake of the Ellingham–Horton graphs, two cubic 3-vertex-connected bipartite graphs that have no Hamiltonian cycle.
James W. Ely Jr., Milton R. Underwood Professor of Law emeritus and professor of history emeritus, recipient of the Brigham-Kanner Property Rights Prize
Leonard Feldman, American physicist, named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2016 for contributions to semiconductor-dielectric interfaces for MOS technologies.
Charlotte Froese Fischer, chemist and mathematician responsible for the development of the multi-configurational self-consistent field of computational chemistry
Edward F. Fischer, Professor of Anthropology
Daniel M. Fleetwood, Olin H. Landreth Chair of the Electrical Engineering, co-invented a memory chip based on mobile protons, one of the top 250 most highly cited researchers in engineering, Chess Grandmaster
Walter Lynwood Fleming, American historian of the South and Reconstruction, dean of the Vanderbilt College of Arts and Sciences in 1923 and later director of the graduate school, supporter of the Southern Agrarians
Jim Foglesong, member of the Country Music Hall of Fame
Hezekiah William Foote, co-founder and Vanderbilt trustee; Confederate veteran, attorney, planter and state politician from Mississippi; great-grandfather of Civil War author Shelby Foote
Harold Ford, Jr., former U.S. Congressman, candidate for Senate
William Franke, American academic and philosopher, professor of Comparative Literature
Marilyn Friedman, American philosopher, W. Alton Jones Chair of Philosophy
Bill Frist, Majority Leader (2002–2007); U.S. Senate (1995–2007); former transplant surgeon
F. Drew Gaffney, NASA astronaut, Payload Specialist for the STS-40 Space Life Sciences (SLS 1) Space Shuttle mission, Professor of Medicine
Sidney Clarence Garrison (1885–1945), 2nd president of Peabody College (now part of Vanderbilt University), 1938–1945
Nicholas Georgescu-Roegen, Romanian American mathematician, statistician and economist, distinguished professor of economics, emeritus (1949–1976), progenitor and a paradigm founder in economics, his work was seminal in establishing ecological economics
Sam B. Girgus, author, film and literature scholar
Ellen Goldring, education scholar
Ernest William Goodpasture, pioneering virologist; invented the method of growing viruses in fertile chickens' eggs
George J. Graham Jr., political theorist who trained generations of political scientists at Vanderbilt, Fulbright scholar, Guggenheim Fellow
Alexander Little Page Green, Methodist minister; a founder of Vanderbilt; his portrait hangs in the Board of Trust lounge of Kirkland Hall on the Vanderbilt campus
Paul Greengard, visiting scholar, neuroscientist known for his work on molecular and cellular function of neurons, 2000 Nobel Prize for Physiology or Medicine
F. Peter Guengerich, professor of biochemistry and the director of the Center in Molecular Toxicology, William C. Rose Award winner
Peter Guralnick, music critic and historian; author; screenwriter
Osamu Hayaishi, prominent Japanese biochemist, discovered oxygenases in 1955
Carolyn Heinrich, economics professor and currently concurrently Sid Richardson Professor at University of Texas at Austin
Suzana Herculano-Houzel, Brazilian neuroscientist working in comparative neuroanatomy; invented method of counting of neurons of the brain, discovered the relation between the cerebral cortex area and thickness and number of cortical folds
Nicholas Hobbs, Provost (1967–1975); former president of the American Psychological Association
Elijah Embree Hoss, chair of ecclesiastical history, church polity and pastoral theology (1885–90); later a bishop of the Methodist Episcopal Church, South
Milton W. Humphreys, Confederate sergeant during the Civil War, first Professor of Latin and Greek at Vanderbilt, president of the American Philological Association (1882–1883)
Dawn Iacobucci, quantitative psychologist and marketing researcher, Professor in Marketing at the Owen Graduate School of Management
Bill Ivey, director of the National Endowment for the Arts during the Clinton administration; director of the Curb Center at Vanderbilt
Kevin Jackson, British writer, broadcaster, filmmaker and pataphysician, former Professor of English, regular BBC contributor, Fellow of the Royal Society of Arts, Companion of the Guild of St George
Mark Jarman, poet and critic often identified with the New Narrative branch of New Formalism
Carl H. Johnson, American biologist, Stevenson Professor of Biological Sciences, Professor of Biological Sciences, Professor of Molecular Physiology and Biophysics
Sir Vaughan Jones, Stevenson Distinguished Professor of Mathematics, Fields Medal winner (1990)
Bjarni Jónsson, Icelandic mathematician and logician, Emeritus Distinguished Professor of Mathematics, namesake of Jónsson algebras, ω-Jónsson functions, Jónsson cardinals, and Jónsson terms
Edward Southey Joynes, first Professor of Modern Languages at Vanderbilt
Peter Kolkay, Associate Professor of Bassoon at the Blair School of Music, 2004 Avery Fisher Career Grant, First Prize at the Concert Artists Guild International Competition
John Lachs, philosopher and pragmatist
Paul C. H. Lim, Vanderbilt University Divinity School professor, scholar on Reformation and post-Reformation England
David Lubinski, psychology professor known for his work in applied research, psychometrics, and individual differences
Nathaniel Thomas Lupton, Professor of Chemistry at Vanderbilt (1875–1885)
Horace Harmon Lurton, Associate Justice of the Supreme Court of the United States (1909–1914), former Dean of Vanderbilt Law School
Ian Macara, British-American biologist researching the molecules that establish Cell polarity in Epithelium, both in normal cells and in cancer, currently the Louise B. McGavock Chair at Vanderbilt
Anita Mahadevan-Jansen, Orrin H. Ingram Chair in Biomedical Engineering
Thomas H. Malone (1834–1906), Confederate veteran; judge; Dean of the Vanderbilt University Law School for two decades
David Maraniss, biographer, columnist for the Washington Post and Distinguished Visiting Professor of Political Science. His articles on President Bill Clinton would win the Pulitzer Prize for National Reporting in 1993.
Jesse W. Markham, American economist best known for his work on antitrust policy, price theory and industrial organization, former chief economist to the Federal Trade Commission, associate professor (1948–1952)
Richard C. McCarty, professor of psychology and provost of Vanderbilt University
Ralph McKenzie, American mathematician, logician, and abstract algebraist.
Douglas G. McMahon, Professor of Biological Sciences and Pharmacology, known for discoveries in the fields of chronobiology and vision
Jon Meacham, Visiting Distinguished Professor of Political Science, former executive vice president of Random House, and presidential biographer
Michael Menaker, former chair of the Pharmacology Department, influential researcher on circadian rhythmicity of vertebrates
Glenn Allan Millikan, former head of the Department of Physiology at the School of Medicine, introduced oximetry into physiology and clinical medicine, invented the first practical, portable pulse oximeter
Jason H. Moore, translational bioinformatics scientist, founding director of the Advanced Computing Center for Research and Education at Vanderbilt (2000–2004)
Lorrie Moore, fiction writer, Gertrude Conaway Vanderbilt Professor of English
Gisela Mosig, German-American molecular biologist best known for her work with enterobacteria phage T4, among the first to recognize the importance of recombination intermediates in establishing new DNA replication forks
Roy Neel, Campaign Manager for Howard Dean; Deputy Chief of Staff for Bill Clinton and Chief of Staff for Al Gore
Herman Clarence Nixon, professor, member of the Southern Agrarians
Thomas Nyfenger, principal flutist of the Mostly Mozart Festival Orchestra and the New York Chamber Symphony, former Associate Professor of Flute at the Blair School of Music
Kelly Oliver, American philosopher specializing in feminism, political philosophy and ethics, W. Alton Jones Professor of Philosophy, founder of the feminist philosophy journal philoSOPHIA.
Aleksandr Olshansky, Soviet and Russian mathematician working in combinatorial and geometric group theory, Professor of Mathematics, Maltsev Prize laureate
Frank Lawrence Owsley, American historian
Sokrates Pantelides, University Distinguished Professor of Physics and Engineering, William and Nancy McMinn Professor of Physics
Lyman Ray Patterson, influential copyright scholar and historian, former Vanderbilt University Law School professor, served as an assistant United States Attorney while teaching at Vanderbilt
Bruce Ryburn Payne (1874–1937), founding president of Peabody College (now part of Vanderbilt University), 1911–1937
Michael D. Plummer, retired professor of mathematics, known for his contributions to graph theory
Michael Alec Rose, composer, author, and Professor of Music Composition at Vanderbilt's Blair School of Music
Edward B. Saff, American mathematician, specializing in complex analysis, approximation theory, numerical analysis, and potential theory, Guggenheim Fellow
Herbert Charles Sanborn (1873–1967), chair of the Department of Philosophy and Psychology at Vanderbilt University 1921–1942
Samuel Santoro, Dorothy B. and Theodore R. Austin Professor and chair at Vanderbilt University, microbiologist and immunologist researching structure and biology of integrin adhesive receptors for extracellular matrix proteins
Mark Sapir, Russian-American mathematician working in geometric group theory, semigroup theory and combinatorial algebra, Centennial Professor of Mathematics
Charles Madison Sarratt (1888–1978), chair of the Department of Mathematics at Vanderbilt University, 1924–1946; Dean of Students, 1939–1945; vice-chancellor, 1946–1958; dean of alumni, 1958–1978
Julia Sears, mathematician, pioneering feminist
Margaret Rhea Seddon, astronaut
Douglas C. Schmidt, computer scientist
Ronald D. Schrimpf, electrical engineer and scientist, Orrin H. Ingram Chair in Engineering, Electrical Engineering & Computer Science, director of the Institute for Space and Defense Electronics at Vanderbilt
Choon-Leong Seow, Singaporean biblical scholar, semitist, epigrapher, and historian of Near Eastern religion, currently as Vanderbilt, Buffington, Cupples Chair in Divinity and Distinguished Professor of Hebrew Bible
Carl Keenan Seyfert, American astronomer, known for research on high-excitation line emission from the centers of some spiral galaxies named Seyfert galaxies, first director of Vanderbilt's Dyer Observatory
Albert Micajah Shipp, Professor of Exegetical Theology at Vanderbilt University in 1875; Dean of the Divinity School, 1882–1887
Steve Simpson, Research Professor of Mathematics, known for reverse mathematics
Ganesh Sitaraman, American legal scholar, Professor of Law, adviser to Elizabeth Warren, Senior Fellow of the Center for American Progress
Francis G. Slack, Professor of Physics and head of the Department of Physics (appointed 1939), instrumental in the discovery of nuclear fission
William Oscar Smith, jazz double bassist; founder of the W.O. Smith Music School in Nashville; former professor at Vanderbilt's Blair School of Music
Larry Soderquist, Professor of Law at Vanderbilt University Law School (1981–2005), director at Corporate and Securities Law Institute
Ronald Spores, archaeologist, ethnohistorian and Mesoamerican scholar
Hans Stoll, his research revolutionized the field of financial derivatives and market microstructure
Thomas Osgood Summers, Methodist theologian; Dean of the Biblical Department at Vanderbilt in 1878
Earl Sutherland, physiologist; discoverer of hormonal second messengers; winner of the 1971 Nobel Prize in Physiology or Medicine
Carol Miller Swain, professor of Political Science and Law
Kent Syverud, former Garner Anthony Professor of Law at the Vanderbilt University Law School, expert on complex litigation, insurance law, and civil procedure
Janos Sztipanovits, computer scientist, led the research group that created a novel area in computer engineering called Model Integrated Computing (MIC)
Robert B. Talisse, American philosopher and political theorist, former editor of Public Affairs Quarterly
Dean S. Tarbell, former Distinguished Professor of Chemistry known for his development of detection methods of chemical warfare agents during World War II, and his discovery of mixed carboxylic-carbonic anhydrides
Vivian Thomas, surgical technician working with Alfred Blalock; developed techniques that enabled key advances in the treatment of traumatic shock
Wilbur Fisk Tillett (1854–1936), professor of theology, dean of the Theological Faculty after 1884 and vice-chancellor after 1886
Norman Tolk, American physicist
Barbara Tsakirgis, American classical archaeologist with specialization in Greek and Roman archaeology
Kalman Varga, Hungarian-American physicist, Fellow of the American Physical Society.
William J. Vaughn (1834–1912), Professor of Mathematics; librarian
Jerzy Vetulani, Polish neuroscientist, pharmacologist and biochemist, former Research Professor, discovered β-downregulation by chronic administration of antidepressants
W. Kip Viscusi, American economist, University Distinguished Professor of Law, Economics, and Management at Vanderbilt University Law School
John Donald Wade, member of English faculty, contributed to Southern Agrarian manifesto I'll Take My Stand
Taylor Wang, first Taiwanese person of Han Chinese ancestry to go into space, employee of the Jet Propulsion Laboratory, payload specialist on the Space Shuttle Challenger mission STS-51-B
John Wikswo, biological physicist, Gordon A. Cain University Professor, Professor of Biomedical Engineering, Professor of Molecular Physiology and Biophysics, director, Vanderbilt Institute for Integrative Biosystems Research and Education, A.B. Learned Professor in Living State Physics
Arthur Frank Witulski, Research Associate Professor Electrical Engineering and Computer Science, engineer at the Institute for Space and Defense Electronics at Vanderbilt
David Wood, British philosopher
Daoxing Xia, Chinese American mathematician, currently a professor in the Department of Mathematics, elected an academician of the Chinese Academy of Science in 1980
Christopher Yoo, professor at Vanderbilt University Law School (1999–2007), former director of Vanderbilt's Technology and Entertainment Law Program, among the most frequently cited scholars of technology law, media law and copyright
Guoliang Yu, Chinese American mathematician best known for his fundamental contributions to the Novikov conjecture on homotopy invariants of higher signatures, Professor of Mathematics (2000–2012)
Serge Aleksandrovich Zenkovsky, Russian historian, specialized in economic history in Eastern Europe and Central Asia, Guggenheim Fellow
Mel Ziegler, American artist specialized in community art, integrated arts, public art, current chair of the Department of Art
Gallery of Vanderbilt notables
References
Lists of people by university or college in Tennessee
|
1657410
|
https://en.wikipedia.org/wiki/List%20of%20acronyms%3A%20C
|
List of acronyms: C
|
(Main list of acronyms)
c – (s) Centi
C – (s) Carbon – Coulomb – One Hundred (in Roman numerals)
C0–9
C2 or C2 – (i) Command and Control
c2c – (s) the British rail company formerly known as LTS Rail
C2C
(p) Coast to Coast Athletic Conference
Consumer-To-Consumer electronic commerce
Cam-To-Cam internet chat
C2D or C2D – (i) Intel Core 2 Duo
C2IEDM or C2IEDM – (i) Command and Control Information Exchange Data Model
C2IS or C2IS – (i) Command and Control Information System
C2PC or C2PC – (i) Command and Control Personal Computer
C2V or C2V – (i) Command and Control Vehicle
C2W or C2W – (i) Command and Control Warfare
C3 or C3
(i) Colorectal Cancer Condition
Command, Control, and Communications
C3I or C3I – (i) Command, Control, Communications, and Intelligence
C4 or C4 – (i) Command, Control, Communications, and Computers
C4I or C4I – (i) Command, Control, Communications, Computers, and Intelligence
C4ISR or C4ISR – (i) Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance
CA
ca – (s) Catalan language (ISO 639-1 code)
Ca – (s) Calcium
CA
(s) California (postal symbol)
Canada (FIPS 10-4 country code; ISO 3166 digram)
Catalonia
(i) Civil Affairs
Close Armour
Cocaine Anonymous
Computer Associates
Counter-Air
Cricket Australia
CAA
(i) Canadian Automobile Association
(NORAD) Center for Aerospace Analysis
(U.S.) Center for Army Analysis
(U.S.) Clean Air Act
(U.S. Army) Concepts Analysis Agency
Civil Aviation Authority
Colonial Athletic Association
CAAT
(i) or (a) Campaign Against Arms Trade
Center for Alternatives to Animal Testing
CAC
(i) California Association of Criminalists
Chronic Asymptomatic [Disease] Carrier
CACM
(i) Central American Common Market
(i) Communications of the ACM
CAD
(s) Canadian dollar (ISO 4217 currency code)
(a) Computer-Aided Design
Computer-Aided Dispatch
Cpplint Anxiety Disorder - (a) Condition suffered by software developers who worry about whether they've left any whitespace on the end of a line
CADCAM – (a) Computer-Aided Design/Computer-Aided Manufacturing
CADMID – (a) Concept, Assessment, Demonstration, Manufacture, In service, Disposal (life cycle mnemonic)
CADPAT – (p) CAnadian Disruptive PATtern
CADT – Child/Adolescent Day Treatment
CAE
(i) Canadian Aviation Electronics (originally)
Certificate in Advanced English
CAEn – (i/a) Close Action Engagement (constructive simulation)
CAF
(s) Central African Republic (ISO 3166 trigram)
(i) Confederation of African Football (or French Confédération Africaine de Football)
CAFAD – (a) Combined Arms For Air Defence
CAFDE
(a) Canadian Association of Film Distributors and Exporters
Computer Aided Federation Development Environment
CAFE – (a) Corporate Average Fuel Economy standard
CAI – (i) Computer Assisted Instruction
CAIR – (i) Council on American-Islamic Relations
Calabarzon – (p) A region in the Philippines: CAvite, LAguna, BAtangas, Rizal, queZON
CALL – (a) (U.S.) Center for Army Lessons Learned
CALM – (p) Communications, Air-interface, Long and Medium range
CalPERS – (p) California Public Employees' Retirement System
CalSTRS – (p) California State Teachers' Retirement System
Caltrans – (p) California Department of Transportation
CAM
(a) Chemical Agent Monitor
Complementary and alternative medicine
Computer-Aided Manufacturing
Crassulacean acid metabolism (type of photosynthesis)
CAMRA – (p) CAMpaign for Real Ale
CAN – (s) Canada (ISO 3166 trigram)
CANA – (a) Convulsive Antidote, Nerve Agent
CANDU – (p) CANada Deuterium Uranium (nuclear reactor design)
Canola – (p) Canadian oil, low acid (referring to a specific cultivar of rapeseed bred to have a low erucic acid content)
CAP
(i) Combat Air Patrol
Civil Air Patrol
Common [Operating/Operational] Air Picture
Crisis Action Procedures
Common Agricultural Policy (European Union)
CAPES
(p) CAPability Evaluation System
(a) Combined Arms Planning and Execution System
CAQ – (i) Coalition Avenir Québec (French, "Coalition for Québec's Future"; political party in that Canadian province)
CARB (i) – California Air Resources Board
CARE
(a) Citizens Association for Racial Equality (former New Zealand organisation)
(p) Community database on Accidents on the Roads in Europe
(a) Cooperative for Aid and Relief Everywhere (originally Cooperative for American Remittances to Europe)
CARMONETTE – (p) Computerized Monte Carlo Simulation
CARP – (a) Computed Air Release Point
CART – (a) Championship Auto Racing Teams (now defunct)
CAS
(i) Chemical Abstracts Service
Chief of the Air Staff
Close Air Support
CASA –(a) Civil Aviation Safety Authority
CASE
(a) Cellular ammunition storage equipment
Computer-Aided Software Engineering
CASS – (a) Command Activated Sonobuoy System
CASTFOREM – (p) Combined Arms and Support Task FORce Evaluation Model
CASTOR – (a) Canadian Automatic Small Telescopes for Orbital Research
cat – (s) Catalan language (ISO 639-2 code)
CAT
(a) Community Acceptance Testing
Computer-Assisted (or Axial) Tomography
CATK – (p) Counterattack
CATS – (a) Computer Active Technology Suspension
CATT – (a/i) Combined Arms Tactical Trainer
CAV – (p) Cavalry
CAVOK – (p) Ceiling And Visibility OK ("Kav-okay")
CAW – (i) Canadian Auto Workers (trade union)
CB
CB
(i) Citizens' Band radio
(s) Cambodia (FIPS 10-4 country code)
CBASSE – (a) Commission on Behavioral And Social Sciences and Education ("sea bass")
CBC
(i) Canadian Broadcasting Corporation
Christmas Bird Count
Cipher-Block Chaining
Cornering Brake Control
CBE
(i) Commander of the Order of the British Empire
Cab Beside Engine (see truck)
CBF – (i) Confederação Brasileira de Futebol (Portuguese, "Brazilian Football Confederation")
CBGB – (i) Country, Blue Grass, and Blues (former New York City nightclub)
CBLA – (i) Comparative bullet lead analysis
CBN – CardsApp Brand Number
CBM – many, including Canadian Baptist Ministries and Commodore Business Machines; see entry
CBML – (i) Coalition Battle Management Language
CBOL – (i) Consortium for the Barcode of Life
CBOT – (i) Chicago Board of Trade
CBR – (i) Case-Based Reasoning
CBRN – (i) Chemical, Biological, Radiological, or Nuclear (weapon or event)
CBRNE – (i) Chemical, Biological, Radiological, Nuclear or [high-yield] Explosive (weapon or event)
CBS
(i) Columbia Broadcasting System
Corps Battle Simulation
CBT
(i) Cognitive Behaviour Therapy
(p) Combat
CBUS – (i) Columbus, Ohio
CC
CC – many, including carbon copy; see entry
CCA – (i) Counter Command Activity
CCCAA – (p/i) California Community College Athletic Association (usually pronounced "3C-2A")
CCC
(i) Canterbury Clothing Company
Civilian Conservation Corps (U.S., 1930s and 1940s)
Corpus Christi College, Oxford
CCCP
(i) Central Committee of the Communist Party
Cyrillic for SSSR (Soyuz Sovetskikh Sotsialisticheskikh Respublik, Russian Союз Советских Социалистических Республик, Union of Soviet Socialist Republics)
CCD
(i) Charge-Coupled Device
Confraternity of Christian Doctrine (Catechism)
CCF – (i) Cartoon Cartoon Fridays
CCG
(i) Canadian Coast Guard
Collectible Card Game
CCGC
(i) Canadian Coast Guard Cutter
Canadian Coast Guard College
CCGH – (i) Canadian Coast Guard Hovercraft
CCGS
(i) Canadian Coast Guard Ship
Christ Church Grammar School
CCH – (i) Computer-Controlled Hostile
CCIF – (p) Comité consultatif international des communications téléphoniques à grande distance (French for International Telephone Consultative Committee, merged with the CCIT in 1956 to form the CCITT)
CCII
(i) Command and Control Information Infrastructure
Community Capital Investment Initiative
CCIR
(i) Comité consultatif international pour la radio (French for Consultative Committee on International Radio, became the ITU Radiocommunication Sector, ITU-R, in 1992)
commander's critical information requirement
CCIT – (p) Comité consultatif international télégraphique (French for International Telegraph Consultative Committee, merged with the CCIF in 1956 to form the CCITT)
CCITT – (p) Comité consultatif international téléphonique et télégraphique (French for International Telegraph and Telephone Consultative Committee, became the ITU Telecommunication Standardization Sector, ITU-T, in 1992)
CCK
(p) Cholecystokinin
(s) Cocos (Keeling) Islands (ISO 3166 trigram)
CCM
(i) Canada Cycle & Motor Co. Ltd. (now split into two separate companies bearing the CCM name, one manufacturing bicycles and the other ice hockey equipment)
Contemporary Christian music
CCOC
(i) Canadian Children's Opera Chorus
CCOP – (i) Coalition Common Operating/Operational Picture
CCP
(i) Casualty Collection Point
Communications Checkpoint
Contingency Communications Package
CCPA – (i) Consumer Credit Protection Act
CCR – (i) Creedence Clearwater Revival
CCRAp – (p) Canadian Conservative Reform Alliance party
CCRP – (i) Command and Control Research Program
CCRTS – (i) Command and Control Research and Technology Symposium
CCSCS – (a) Coordinadora de Centrales Sindicales del Cono Sur
CCSCS – (i) Consultative Committee for Space Data Systems
CCSIL – (i) Command and Control Simulation Interface Language ("cecil")
CCSK – (i) Cyclic Code Shift Keying
CCT – (i) Current Commitments Team
CCTT – (i) Close Combat Tactical Trainer
CD
cd – (s) Candela
Cd – (s) Cadmium
CD – many, including Compact Disc; see entry
CD1 – (i) Cluster of Differentiation 1 (a small gene family)
CDA – (i) UK Centre for Defence Analysis
CDC
(i) Centers for Disease Control and Prevention (originally (U.S.) Communicable Disease Center)
Control Data Corporation
Cult of the Dead Cow
CDD – (i) Capabilities Development Document
CDE – (i) Chemical Defence Equipment
CDEC – (i) U.S. Combat Development Experimentation Center
CDF
(i) California Department of Forestry [and Fire Protection]
Common Data Format
(s) Democratic Republic of Congo franc congolais (ISO 4217 currency code)
CDIAC – (a) Carbon Dioxide Information Analysis Center ("see-dee-ack")
CDipAF – (i) Certified Diploma in Accounting and Finance
CDL – (i) Commercial driver's license
CDM
(i) Clean Development Mechanism (Kyoto protocol)
Cold Dark Matter (astronomy)
CDMA – (i) Code Division Multiple Access
CDMO – (i) Contract Developpement & Manufacturing Organizations
CDMSII – (p) Cryogenic Dark Matter Search II
CDMX – (p) Ciudad de México, the Spanish name of Mexico City
Cdr – (p) Commander
CDS
(i) Chief of the Defence Staff
Credit default swap
Cdt – (p) Commandant
CDT – (i) Central Daylight Time (UTC−5 hours)
CE
ce – (s) Chechen language (ISO 639-1 code)
Ce – (s) Cerium
CE – many, including Christian/Common Era (cf. AD); see entry
CEA – (i) Campaign Effectiveness Analysis
CECOM – (p) U.S. Army Communications and Electronics Command
CEDEX – (p) Courrier d'entreprise à distribution exceptionnelle (French, "Company Mail with Exceptional Distribution"; "exceptional" refers to the volume of mail)
CEGEP – (p) Collège d'enseignement général et professionnel (French, "College of General and Vocational Education")
CEI – (i) Competitive Enterprise Institute
CENTCOM – (p) United States Central Command
CENTO – (a) Central Treaty Organization (Baghdad Pact)
CENZUB – (p) Centre d'entraînement aux actions en zone urbaine (French, "Urban Operations Training Centre")
CEO – (i) Chief Executive Officer
CEP – (i) Circular Error Probable
CEPT – (a/i) Conférence européenne des administrations des postes et des télécommunications (French, "European Conference of Postal and Telecommunications Administrations")
CERCLA – (a) U.S. Comprehensive Environmental Response, Compensation, and Liability Act of 1980 (Superfund)
CERDEC – U.S. Communications-Electronics Research, Development and Engineering Center
CERGA – (a) Centre de recherches en géodynamique et astrométrie (French, "Astrometry and Geodynamics Research Centre")
CERN – (a) Centre européen pour la recherche nucléaire (French, "European Organization for Nuclear Research")
CERT – (a) Computer Emergency Response Team
ces – (s) Czech language (ISO 639-2 code)
CESS – (i) Centre for Earth Science Studies (India)
CEV
(i) Combat Engineer Vehicle
Confédération européenne de volleyball (French, "European Volleyball Confederation")
Crew Exploration Vehicle
CEWC – (a/i) Council for Education in World Citizenship
CF
cf. – (i) confer (Latin "compare", or "see also")
Cf – (s) Californium
CF
(i) Canadian Forces
(s) Central African Republic (ISO 3166 digram)
Republic of the Congo (FIPS 10-4 country code)
CFA
(i) Cat Fanciers' Association
Chartered Financial Analyst
College Football Association (former consortium of US major college football conferences)
Color Filter Array
County Fire Authority
Covering Force Area
CFAR
(i) Christine's
Federal Acquisition Regulation
CFC
(i) ChloroFluoroCarbon
Canadian Fish Company
CFES – (a) Continuous Flow Electrophoresis System
CFFZ – (i) Call For Fire Zone
CFG
(i) Context-free grammar
Control-flow graph
CFHT – (i) Canada–France–Hawaii Telescope
CFI – (i) Center for Inquiry (CSICOP)
CFL
(i) Canadian Football League
Co-ordinated Fire Line
CFLCC – (i) Coalition Forces Land Component Command
CFM – (i) Certified Facilities Manager [(IFMA)]http://www.ifma.org/
CFO – (i) Chief Financial Officer
CFP
(i) Call for papers
College Football Playoff
Common Fisheries Policy (EU)
CFR
(i) Code of Federal Regulations
Căile Ferate Române (Romanian, "Romanian Railways")
CFRP – (i) Carbon fibre reinforced plastic
CFS – (i) Chronic Fatigue Syndrome
CFSP – (i) Common Foreign and Security Policy
CFU – (i) Colony Forming Unit(s) in Microbiology
CFV – (i) Cavalry Fighting Vehicle
CFZ – (i) Critical Friendly Zone
CG
CG – (i) Client Group – Computer Graphics – Controls Group – (s) Democratic Republic of the Congo (FIPS 10-4 country code) – Republic of the Congo (ISO 3166 digram)
CGDC – (i) Computer Game Developers Conference (became GDC in 1998)
CGF – (i) Computer-Generated Forces (Simulation)
CGH – (i) Comparative Genomic Hybridisation
CGIG – (i) Cross-Government Implementation Group
CGM – (i) Computer Graphics Metafile
CGO – (s) Republic of the Congo (IOC and FIFA trigram, but not ISO 3166)
CGS – (i) Chief of the General Staff
CGSI – Consumer Guidance Society of India
CGT – (i) Capital Gains Tax
CH
ch – (s) Chamorro language (ISO 639-1 code)
ch – ch(L) is used to denote the Chern character of a line bundle
CH – (p) Chieftain tank – (s) China (FIPS 10-4 country code) – Switzerland (ISO 3166 digram; from Latin Confoederatio Helvetica)
cha – (s) Chamorro language (ISO 639-2 code)
CHAMPUS – (a) (U.S.) Civilian Health and Medical Program of the Uniformed Services (now known as TRICARE)
CHAOS – (a) Cambridge Heart Anti-Oxidant Study
CHAPS – (a) Clearing House Automated Payment System
CHDK – (i) Canon Hack Development Kit (Canon camera firmware hack)
che – (s) Chechen language (ISO 639-2 code)
CHE – (s) Switzerland (ISO 3166 trigram; from Latin Confoederatio Helvetica)
CHF – (s) Swiss franc (ISO 4217 currency code)
CHI
Catholic Health Initiatives (US hospital network)
(s) Chile (IOC and FIFA trigram, but not ISO 3166)
(i) Columbia Helicopters, Inc
Computer-Human Interaction
CHiP – (a) California Highway Patrol
CHIPS – (a) Cosmic Hot Interstellar Plasma Spectrometer
CHL – (s) Chile (ISO 3166 trigram)
CHLA – (a) Core Historical Literature of Agriculture
CHN – (s) China (ISO 3166 trigram)
CHOGM – (a) Commonwealth Heads of Government Meeting
CHP – (i) California Highway Patrol – Combined Heat and Power
CHPSO – (a) California Hospital Patient Safety Organization
CHS – (i) Combat Health Support
CHT – (i) Certified Hand Therapist
chu – (s) Old Church Slavonic language (ISO 639-2 code)
chv – (s) Chuvash language (ISO 639-2 code)
CREN – (p) Christian Real Estate Network Real Estate Association
CI
Ci – (s) Curie
CI
(s) Chile (FIPS 10-4 country code)
Côte d'Ivoire (ISO 3166 digram)
(i) Counter-Intelligence
101 (in Roman numerals)
CIA
(i) Cairo International Airport
Central Intelligence Agency
Culinary Institute of America
CIAO
(i) Critical Infrastructure Assurance Office
Component-Integrated ACE ORB
CIB – (i) Complete In Box (Internet auction/trading listings)
CIBC – (i) Canadian Imperial Bank of Commerce
CICS – (a) Customer Information Control System (IBM mainframe software; "kicks" or "C-I-C-S")
CID
(p) Combat Identification
(i) Criminal Investigation Division
Criminal Investigations Department
CID – Certified Interior Designer - A Certified Interior Designer (CID) licensed in New York (USA) plans, designs, supervises and/or consults on various aspects of interior spaces.
CIÉ – (i) Commission internationale de l'éclairage
CIEF – (i) Comité international d'enregistrement des fréquences (International Frequency Registration Board)
CIF – (i) Cost, Insurance, and Freight (Paid) (shipping)
CIMIC – (p) Civil-Military Co-operation
CIMMYT – (a/i) Centro Internacional de Mejoramiento de Maíz Y Trigo (Spanish, "International Maize and Wheat Improvement Center")
CINC – (p) Commander in Chief
CINEOS – (a) Campo Imperatore Near-Earth Object Survey
CIO
(i) Chief information officer
Congress of Industrial Organizations
CIP – (a) Combat Identification Panel
CIPE – (i) (European) Centre for International Political Economy
CIR – (i) (Commander's) Critical Information Requirements
CIR – (s) Corotating Interaction Region
CIS
(i) Canadian Interuniversity Sport, a former name of the organization now known as U Sports
Commonwealth of Independent States
Command and Information System
Communication and Information System
CISA – (a) (U.S.) C4I Integration Support Activity
CISB – (i) Complete In Sealed Box (Internet auction/trading listings)
CISPR – (i) Comité international spécial des perturbations radioélectriques (Special International Committee on Radio Interference)
CISSP – (i) Certified Information Systems Security Professional
CITES – (p) Convention on International Trade in Endangered Species (of Wild Fauna and Flora) ("sigh-tease")
CITS – (i) Combat Identification Training System
CIV – (s) Côte d'Ivoire (ISO 3166 trigram)
CIVETS – (a) Colombia, Indonesia, Vietnam, Egypt, Turkey, South Africa (economics)
CIVPOP – (p) Civilian Population
CIWS – (i) Close-In Weapon System
CHRS – Canadian Heart Rhythm Society
CJ
CJ
(s) Cayman Islands (FIPS 10-4 country code)
(i) Criminal Justice
CJC
(i) Canadian Jewish Congress
Cold Junction Compensation
CJD
(i) Chronological Julian Day
Creutzfeldt–Jakob disease
CJCS – (i) Chairman of the Joint Chiefs of Staff
CJO – (i) Chief of Joint Operations
CJTF – (i) Combined Joint Task Force
CK
CK – (s) Cocos (Keeling) Islands (FIPS 10-4 country code) – Cook Islands (ISO 3166 digram)
CKA – (i) commonly known as, (a) Canada Kicks Ass
CKND – Codename: Kids Next Door
CL
Cl – (s) Chlorine
CL – (s) Chile (ISO 3166 digram) – (i) Co-ordination Line – One Hundred and Fifty (in Roman numerals)
CLA – (i) Clutterers Anonymous
CLEC – (i) Competitive Local Exchange Carrier
CLEMARS – (a) California Law Enforcement Mutual Aid Radio System
CLI – (i) Command Line Interface/Interpreter
CLIC – (p) Compact LInear Collider
CLO – (i) Cornell Lab of Ornithology
CLOB – (p) Character Large OBject
CLOS – (i) Command to Line-Of-Sight (missile control system)
CLOS – (a) Common Lisp Object System
CLP – (s) Chilean peso (ISO 4217 currency code) – (i) Common [Operating/Operational] Land Picture
CLPFC – (i) CentroLateral PreFrontal Cortex
CLRP – (a) College Loan Repayment Program
CM
Cm – (s) Curium
CM
(s) Cameroon (FIPS 10-4 country code; ISO 3166 digram)
(i) Cruise Missile
(s) Nine Hundred (in Roman numerals)
CMA
(i) U.S. Chemical Materials Agency
Country Music Association (also used to refer to the organization's annual awards)
Crystal Meth Anonymous
CMB – (i) Cosmic Microwave Background
CMBR – (i) Cosmic Microwave Background Radiation
CME – (a) Coronal Mass Ejection (usually Sun)
CMHC – (i) Canada Mortgage and Housing Corporation
CMIIAW – (i) Correct me if I am wrong
CMIS
(a) Content Management Interoperability Services
Common management information service
CMJ – (i) Christopher Martin-Jenkins (BBC sports commentator)
CML
(p) Chemical
(i) Chronic Myelogenous Leukemia (formerly Chronic Myeloid Leukemia)
CMLL – (i) Consejo Mundial de Lucha Libre (Spanish, "World Wrestling Council"—Mexican professional wrestling promotion)
CMM – (i) Capability Maturity Model
CMMC – (i) Corps Materiel Management Centre
CMML
(i) Chronic MyeloMonocytic Leukemia
Continuous Media Markup Language
CMO – (i) Civil-Military Operations
CMOC – (i) Civil-Military Operations Centre
CMOS
(i) Canadian Meteorological and Oceanographic Society
(The) Chicago Manual of Style
Complementary Metal Oxide Semiconductor
CMP – (i) Common [Operating/Operational] Maritime Picture
CMP – (i) Canadian Military Pattern truck (World War II)
CMPD
(i) Chronic Myeloproliferative Disease
(i) Charlotte-Mecklenburg Police Department
(i) Costa Mesa Police Department
CMR
(s) Cameroon (ISO 3166 trigram)
(i) Coaxial Main Rotors (helicopter type)
CMS
(i) Centers for Medicare and Medicaid Services
The Chicago Manual of Style
CMT – (i) Country Music Television
CMU
(i) Carnegie Mellon University
Central Michigan University
Concrete Masonry Unit
CMW
(i) Marconi's Wireless Telegraph Company of Canada
Canadian Manufacturing Week
Canadian Music Week
Catherine McAuley Westmead (school in New South Wales, Australia)
Chicago, Missouri and Western (Railway)
Compartmented Mode Workstation
Compton's Most Wanted
Continuous Microwave (processing technology)
Custom Maintenance Wizard (Microsoft Office Resource Kit)
CMYK – (i) Cyan Magenta Yellow Key/blacK (color model)
CN
CN
(i/s) Canadian National (railway; also the AAR reporting mark for said company)
(s) China (ISO 3166 digram)
Comoros (FIPS 10-4 country code)
CNA
(i) Center for Naval Analyses
Certified Network Administrator
Computer Network Attack
Continental (Casualty Company), National (Fire Insurance Company), and American (Casualty Company), the three companies that merged to form what is now known as CNA Financial
CNBC – (a/i) Consumer News and Business Channel
CND
(i) Campaign for Nuclear Disarmament
Computer Network Defence
CNE
(i) Canadian National Exhibition
Computer Network Exploitation
Certified Network Engineer
CNES – (i) Centre national d'études spatiales (French, "National Centre for Space Studies")
CNF – (p) Cost and Freight
CNI – (i) Communications, Navigation and Identification
CNI – (a) Clinical Nursing Intern
CNN
(i) Cable News Network
Cellular Nonlinear Network
CNO – (i) Computer Network Operations
CNR
(i) Canadian National Railway
Combat Net Radio
CNV – (i) Copy-Number Variable (genetics)
CNY – (s) Chinese yuan renminbi (ISO 4217 currency code)
CO
c/o – (i) care of (postal code indicating temporary address change)
co – (s) Corsican language (ISO 639-1 code)
Co – (s) Cobalt
Co. – Company
CO – many, including Central Office (phone company); see entry – (s) Colorado (postal symbol) – (i) Commanding Officer (military)
COA – (i) Certificate/Concept Of Analysis – Course Of Action (military)
COB – (i) Close Of Business [day]
COBOL (p) – COmmon Business-Oriented Language
COBRA – Consolidated Omnibus Budget Reconciliation Act of 1985
COCOM – (p) Combatant Command (military)
COD – (i) Cash On Delivery – (s) Democratic Republic of the Congo (ISO 3166 trigram)
CoDA – (i) Co-Dependents Anonymous
codec – (p) Coder-Decoder / Compressor-Decompressor / Compression-Decompression algorithm
COE – (i) Cab Over Engine (see truck) – Common Operating Environment (military)
COEA – (i) Cost Operational Effectiveness Analysis (military)
COEIA – (i) Combined Operational Effectiveness and Investment Appraisal (military)
C of I – (i) Certificate of Indebtedness (financial) – (i) The College of Idaho
COFT – (i) Conduct Of Fire Trainer (military)
COG – (i) Centre Of Gravity – Current Operations Group (military) – (s) Republic of the Congo (ISO 3166 trigram)
COGENT – (a) Cognitive Objects within a Graphical EnviroNmenT
COIL – (a) Chemical Oxygen Iodine Laser
COIN – (p) Counter-Insurgency (military)
COK – (s) Cook Islands (ISO 3166 trigram)
COL – (s) Colombia (ISO 3166 trigram)
COLA – (a) comp.os.linux.announce – Cost Of Living Adjustment
COLT – (a) Combat Observation and Lasing Team (military)
COM – (s) Comoros (ISO 3166 trigram) – (a) Component Object Model
COMECON – (p) Council for Mutual Economic Assistance (economic counterpart of the Warsaw Pact, 1949–1991)
COMMZ – (p) Communications Zone (military)
COMSEC – (p) Communications Security (military)
CONAD – (p) U.S. Continental Air Defense Command
CONCACAF – (a) Confederation Of North, Central American and Caribbean Association Football
CONMEBOL – (p) Confederación Sudamericana de Fútbol or Confederação Sul-Americana de Futebol (respectively Spanish and Portuguese for "South American Football Confederation")
CONOPS – (p) Concept of Operations (military)
CONUS – (p) Continental United States
COO – (i) Chief Operating Officer
COP – (s) Colombian peso (ISO 4217 currency code) – (a) Common Operating/Operational Picture
COPD –(i) Chronic obstructive pulmonary disease
COPE – (a) U.K. Committee On Publication Ethics
COPUS – (p) U.K. Committee on the Public Understanding of Science
cor – (s) Cornish language (ISO 639-2 code)
CORBA – (a) Common Object Request Broker Architecture
CORD – (i/a) Common Operational Requirements Document
CORE – (a) Consortium for Oceanographic Research and Education
CORG – (i) (U.S.) Combat Operations Research Group
COROT – (p) COnvection, ROtation and planetary Transits
cos – (s) Corsican language (ISO 639-2 code) – Cosine
COS – (i) Cooper Ornithological Society
COSCOM – (p) Corps Support Command (military)
COSER – (p) COoperative SERvice
COSHH – (p) Control Of Substances Hazardous to Health (United Kingdom)
CoT – (i) Car of Tomorrow (former NASCAR race car design)
COTS – (a) Commercial Off The Shelf
COVID-19 – Coronavirus disease 2019
Coy – (s) Company (military unit)Cow
CP
CP
(i) Canadian Pacific
Check Point
Command Post
Club Penguin
CPA – (i) Certified Public Accountant
CPAC
(p) Conservative Political Action Conference
Cable Public Affairs Channel ("see-pack")
CPAP
(i) Center for Public Administration and Policy
Coalition for the Prevention of Alcohol Problems
Consecutive primes in arithmetic progression
(p) Continuous positive airway pressure ("see-pap")
CPC – Certified Professional Coder, a certification from AAPC
CPCU – Certified Property Casualty Underwriter
CPD – (i) Capabilities Production Document
CPE
(i) Certificate of Proficiency in English
Certified Professional Ergonomist
CPEC – (p) China–Pakistan Economic Corridor ("see-pec")
CPF
(i) Calibration Parameter File
Canadian Patrol Frigate
CPG – (a) Clinical Practice Guideline
CPI – (i) CERDEC Command, Power and Integration
CPIM – (a) Certification on Production and Inventory Management
CPIR – Computationally-Private Information Retrieval
CPON – (i) Certified Pediatric Oncology Nurse
CPPCC – (i) Chinese People's Political Consultative Conference
CPR – (i) Canadian Pacific Railway
CPR – (i) Cardiopulmonary resuscitation
CPSM – (i) Continuous Phase Shift Modulation
CPSU – (i) Communist Party of the Soviet Union
CPT – (i) Contingency Planning Team
CPU
(i) Central Processing Unit
Contract Postal Unit
CPV – (s) Cape Verde (ISO 3166 trigram)
CPX – (p) Command Post eXercise
CQ
CQ – (i) Carrier Qualification – Central Queensland – Charge of Quarters – Congressional Quarterly – Constellation Airlines (IATA airline designator) – Northern Mariana Islands (FIPS 10-4 territory code)
CQD – (i) Close Quarters Drill (Morse distress code preceding SOS: CQ "calling all stations", D "Distress"; often incorrectly interpreted as "Come Quick, Distress")
CR
cr – (s) Cree language (ISO 639-1 code)
Cr – (s) Chromium
CR
(s) Coral Sea Islands (FIPS 10-4 territory code)
Costa Rica (ISO 3166 digram)
CRAM – (i) Combined Radiometric Correction Model
CRC
(i) Central RTI Component
Chemical Rubber Company
Christian Reformed Church
Control and Reporting Centre
Cyclic Redundancy Check
(s) Costa Rican colón (ISO 4217 currency code)
Costa Rica (IOC and FIFA trigram, but not ISO 3166)
CRD – (i) Capstone Requirements Document
cre – (s) Cree language (ISO 639-2 code)
C.R.E.A.M. –Cash Rules Everything Around Me
CREB – (a) Cyclic AMP-response Element Binding (protein)
CREEP – (a) Committee for the Re-Election of the President, a pejorative nickname used by opponents
CRI
(a) China Radio International
(s) Costa Rica (ISO 3166 trigram)
CRIPL – (i) Consolidated Remain-In-Place List
CRISPR – (a) clustered regularly interspaced short palindromic repeats
CRM – (i) Cardiac Rhythm Management – Customer Relationship Management
CRO – (s) Croatia (IOC and FIFA trigram, but not ISO 3166) – Contract Research Organization
CRP
(i) Committee for the Re-Election of the President
Control and Reporting Post
CRT
(i) Cardiac Resynchronization Therapy
Cathode Ray Tube
Chinese Remainder Theorem
CRTC – (i) Canadian Radio-television and Telecommunications Commission
CS
cs – (s) Czech language (ISO 639-1 code)
Cs – (s) Caesium
CS
(i) Combat Support
Computer Scientist
Counter-Strike
(s) Costa Rica (FIPS 10-4 country code)
Serbia and Montenegro (ISO 3166 digram; obsolete since 2006)
CSA
(i) Canadian Soccer Association
Canadian Space Agency
Canadian Standards Association
Chief Scientific Advisor
Child Support Agency
Command Staff Advisor
Community-supported agriculture
Confederate States of America
Corps Storage Area
(p) Czech Airlines
C/S/A – (i) CINC, Service, and Agency
CSAR – (p) Combat Search and Rescue ("seessar")
CSC
(i) Closed Spacelike Curve (relativity)
Compact system camera
Computer Sciences Corporation (became DXC Technology in 2017)
Computer Security Centre
CSCC Canadian Society of Clinical Chemists
CSEAL – (i/a) Combat Systems Engineering and Analysis Laboratory ("see-seal")
CSERIAC – (p) (U.S. DoD) Crew Systems Ergonomics Information Analysis Center
CSG – (i) Corps Support Group
CSI – see entry
CSICOP – (i) Committee for the Scientific Investigation of Claims of the Paranormal (became the Committee for Skeptical Inquiry in 2006)
CSIP – (i) Commercial Stable Image Platform (AMD)
CSIS
(p) Canadian Security Intelligence Service ("seessiss")
(i) (U.S.) Center for Strategic & International Studies
CSK – (s) Czechoslovakia (ISO 3166 trigram; obsolete since 1993)
CSL – (i) U.K. Central Science Laboratory
CSM – see entry
C-SPAN – (i) Cable-Satellite Public Affairs Network
CSPI – (i) Center for Science in the Public Interest
CSR – (i) Control Supply Rate
CSR – (i) Corporate Social Responsibility
CSRC – (i) Conflict Studies Research Centre
CSRF – (i) Cross-Site Request Forgery
CSS
(i) Cascading Style Sheets
Catalina Sky Survey
Central Security Service
Combat Service Support
Confederate States Ship
Content-scrambling system
Cross-site scripting
CSSCS – (i) Combat Service Support Control System
CST – (i) Central Standard Time (UTC−6 hours)
CT
CT – (i) Computed tomography (medical scan also known as a CAT scan) – Central Time zone – Chrono Trigger (Computer/Video games) – (s) Connecticut (postal symbol) – Canterbury (postal symbol) – Chhattisgarh (Indian state code)
CTA
(s) Central African Republic (FIFA trigram, but not ISO 3166 or IOC)
(i) Chicago Transit Authority
(i) Comando-Geral de Tecnologia Aerospacial (Portuguese, [Brazilian] "General Command for Aerospace Technology")
CTBT – (i) Comprehensive [Nuclear] Test Ban Treaty
CTC – (i) Closed Timelike Curve (relativity) – (U.S.) Combat Training Center
CTDB – (i) Compact Terrain Data Base (file format)
CTE
(s) Canton and Enderbury Islands (ISO 3166 trigram; obsolete 1984)
(i) Chronic traumatic encephalopathy
CTGF – (i) connective tissue growth factor
CTI – (i) Co-operative Target Identification
CTIL – (i) Critical Tracked Items List
CTIS – (i) Central Tire Inflation System
CTMS – (i) Clinical Trial Management System
CTO – (i) Chief Technical Officer – Chief Technology Officer
CTS – (i) Clear-To-Send – Collective Training Standards – Communications Technology Service – Contract Technical Services – Conversation Time Sharing – COSMIC Top Secret
CTSS – (i) Compatible Time-Sharing System
CTU – (i) Counter Terrorist Unit (fictional branch of the Central Intelligence Agency in the television action series 24)
CTVT – (i) Canine Transmissible Venereal Tumour
CU
cu – (s) Old Church Slavonic language (ISO 639-1 code)
Cu – (s) Copper (Latin Cuprum)
CU
(i) Carrie Underwood
(s) Cuba (FIPS 10-4 country code; ISO 3166 digram)
(i) University of Colorado Boulder
CUB – (s) Cuba (ISO 3166 trigram)
CUCV – (i) Commercial Utility Cargo Vehicle
CUDAAP –(a) Custom Database Applications
CUNY – (a) City University of New York ("CUE-knee")
CUP – (s) Cuban peso (ISO 4217 currency code)
CUPE – (a) Canadian Union of Public Employees ("CUE-pee")
CUPS – (a) Common Unix Printing System
CUPW – (i) Canadian Union of Postal Workers
CUREA – (a) Consortium for Undergraduate Research and Education in Astronomy
CuW – (s) Copper-tungsten pseudo-alloy (from the chemical symbols of the two component elements)
CUW – (s) Curaçao (ISO 3166 trigram)
CV
cv – (s) Chuvash language (ISO 639-1 code)
CV – many, including curriculum vitae (résumé); see entry
CVCC
(i) Combat Vehicle Command and Control
Compound Vortex Controlled Combustion (1970s Honda automobile engine technology)
CVE – (s) Cape Verde escudo (ISO 4217 currency code)
CVI – (i) Combat Vehicle Identification
CVLL – (i) Crypto Variable Logic Label
CVR – (i) Cockpit Voice Recorder – Combat Vehicle Reconnaissance
CVR(T) – (i) Combat Vehicle Reconnaissance (Tracked)
CVS – (i) Concurrent Versions System
CVSD – (i) Continuous Variable Slope Delta (modulation)
CVT – (i) Continuously Variable Transmission
CW
CW – (i) Continuous Wave – Clothes Washer - (s) Cook Islands (FIPS 10-4 territory code)
CW/CE – (i) Construction Worker / Construction Electrician IBEW
CWC – (i) Chemical Weapons Convention
CWL – (i) Campus Wide Login
CWS – (i) Canadian Wildlife Service
CWRU – (i) Case Western Reserve University
CX
CX – (s) Christmas Island (ISO 3166 digram) – One Hundred and Ten (in Roman numerals)
CXR – (s) Christmas Island (ISO 3166 trigram)
CY
cy – (s) Welsh language (ISO 639-1 code)
CY – (i) Calendar year – (s) Cyprus (ISO 3166 and FIPS 10-4 country code digram)
cym – (s) Welsh language (ISO 639-2 code)
CYM – (s) Cayman Islands (ISO 3166 trigram)
CYP – (s) Cyprus (ISO 3166 trigram) – Cyprus pound (ISO 4217 currency code)
CZ
CZ
(i) combat zone
(s) Czech Republic (ISO 3166 and FIPS 10-4 country code digram)
CZE – (s) Czech Republic (ISO 3166 trigram)
CZK – (s) Czech koruna (ISO 4217 currency code)
CZF – constructive Zermelo-Fraenkel
CZMA – (i) (US) Coastal Zone Management Act
CZW – (i) Combat Zone Wrestling
See also
Acronyms C
|
22947640
|
https://en.wikipedia.org/wiki/Paul%20Vit%C3%A1nyi
|
Paul Vitányi
|
Paul Michael Béla Vitányi (born 21 July 1944) is a Dutch computer scientist, Professor of Computer Science at the University of Amsterdam and researcher at the Dutch Centrum Wiskunde & Informatica.
Biography
Vitányi was born in Budapest to a Dutch mother and a Hungarian father. He received his degree of mathematical engineer from Delft University of Technology in 1971 and his Ph.D. from the Free University of Amsterdam in 1978.
Career
Vitányi was appointed Professor of Computer Science at the University of Amsterdam, and researcher at the National Research Institute for Mathematics and Computer Science in the Netherlands (CWI) where he is currently a CWI Fellow. He was Guest Professor at the University of Copenhagen in 1978; Research Associate at the Massachusetts Institute of Technology in 1985/1986; Gaikoku-Jin Kenkyuin (Councellor Professor) at INCOCSAT at the Tokyo Institute of Technology in 1998; Visiting Professor at Boston University in 2004, at Monash University in 1996 and at the National ICT of Australia NICTA at University of New South Wales
in 2004/2005; visiting professor at and Adjunct Professor of Computer Science at the University of Waterloo from 2005.
Vitányi has served on the editorial boards of Distributed Computing (1987–2003), Information Processing Letters; the Theory of Computing Systems; the Parallel Processing Letters; the International journal of Foundations of Computer Science; the Entropy; the Information; the SN Computer Science; the Journal of Computer and Systems Sciences (guest editor), and elsewhere.
Awards & honours
1999 – National Outstanding Scientific and Technological Book Award of the People's Republic of China
2003 – CWI Fellow
2003 – Bronze Medal University of Helsinki
2005 – Adjunct Professor Computer Science University of Waterloo
2007 – knighthood in the Order of the Netherlands Lion,
2007 – International Federation for Information Processing (IFIP) Silver Core Award
2011 – Member of the Academia Europaea.
2020 - McGuffey Longevity Award of the Textbook & Academic Authors Association (TAA).
Work
Vitányi has worked on cellular automata, computational complexity, distributed and parallel computing, machine learning and prediction, physics of computation, Kolmogorov complexity, information theory and quantum computing, publishing over 200 research papers and some books. As of 2020 his work on normalized compression distance was used in 15 US patents and on
normalized Google distance in 10 US patents.
Together with Ming Li he pioneered theory and applications of Kolmogorov complexity. They co-authored the textbook An Introduction to Kolmogorov Complexity and Its Applications, parts of which have been translated into Chinese, Russian and Japanese. The textbook
received the William Holmes McGuffey Longevity Award of the Textbook & Academic Authors Association (TAA) (2020), and the Chinese translation received the National Outstanding Scientific and Technological Book Award of the People's Republic of China (1999).
References
External links
Personal web page
1944 births
Living people
Dutch computer scientists
Theoretical computer scientists
Researchers in distributed computing
Delft University of Technology alumni
Vrije Universiteit Amsterdam alumni
University of Amsterdam faculty
People from Budapest
Knights of the Order of the Netherlands Lion
|
44810381
|
https://en.wikipedia.org/wiki/OpenFL
|
OpenFL
|
OpenFL is a free and open-source software framework and platform for the creation of multi-platform applications and video games. OpenFL applications can be written in Haxe, JavaScript (EcmaScript 5 or 6+), or TypeScript, and may be published as standalone applications for several targets including iOS, Android, HTML5 (choice of Canvas, WebGL, SVG or DOM), Windows, macOS, Linux, WebAssembly, Flash, AIR, PlayStation 4, PlayStation 3, PlayStation Vita, Xbox One, Wii U, TiVo, Raspberry Pi, and Node.js.
The most popular editors used for Haxe and OpenFL development are:
Visual Studio Code (with plugin)
HaxeDevelop (supports code folding, code refactoring and interactive debugging)
Sublime Text (with plugin)
IntelliJ IDEA (with plugin)
OpenFL contains Haxe ports of major graphical libraries such as Away3D, Starling, Babylon.js, Adobe Flash and DragonBones. Due to the multi-platform nature of OpenFL, such libraries usually run on multiple platforms such as HTML5, Adobe AIR and Android/iOS.
More than 500 video games have been developed with OpenFL, including the BAFTA-award-winning game Papers, Please, Rymdkapsel, Lightbot, Friday Night Funkin', and Madden NFL Mobile.
Technical details
OpenFL
OpenFL is designed to fully mirror the Flash API. SWF files created with Adobe Flash Professional or other authoring tools may be used in OpenFL programs.
OpenFL supports rendering in OpenGL, Cairo, Canvas, SVG and even HTML5 DOM. In the browser, OpenGL is the default renderer but if unavailable then canvas (CPU rendering) is used. Certain features (shape.graphics or bitmapData.draw) will use CPU rendering, but the display list remains GPU accelerated as far as possible.
Lime
OpenFL uses the Lime library for low-level rendering. Lime provides hardware-accelerated rendering of vector graphics on all supported platforms.
Lime is a library designed to provide a consistent "blank canvas" environment on all supported targets, including Flash Player, HTML5, Microsoft Windows, macOS, Linux, iOS, Android, consoles, set-top boxes and other systems. Lime is a cross-platform graphics, sound, input and windowing library, which means OpenFL can focus on being a Flash API, and not handling all these specifics. Lime also includes command-line tools.
Haxe
Haxe is a high-level cross-platform multi-paradigm programming language and compiler that can produce applications and source code, for many different computing platforms, from one code-base. It is free and open-source software, distributed under the GNU General Public License (GPL) 2.0, and the standard library under the MIT License.
Haxe includes a set of common functions that are supported across all platforms, such as numeric data types, text, arrays, binary and some common file formats. Haxe also includes platform-specific application programming interface (API) for Adobe Flash, C++, PHP and other languages.
Haxe originated with the idea of supporting client-side and server-side programming in one language, and simplifying the communication logic between them. Code written in the Haxe language can be source-to-source compiled into ActionScript 3, JavaScript, Java, C++, C#, PHP, Python, Lua and Node.js. Haxe can also directly compile SWF, HashLink and NekoVM bytecode.
Starling
The Haxe port of the Starling Framework runs on Stage3D and supports GPU-accelerated rendering of vector graphics. It uses a custom Stage3D implementation, and does not require the OpenFL display list to work.
References
See also
Haxe
Adobe AIR
Free software
Software licenses
Software using the MIT license
Software frameworks
|
13961461
|
https://en.wikipedia.org/wiki/Garden%20Networks
|
Garden Networks
|
Garden Networks is a not-for-profit organization registered in Canada, that specializes in providing Internet anti-censorship/Internet privacy products for free. The full name of Garden Networks is Garden Networks for Freedom of Information.
History
Garden Networks was started in 2001 by a group of computer software and network engineers. In the same year, the first version of their software tool "Garden" was released, aiming at providing Internet access to web sites blocked by the Chinese government, including web sites of news agencies such as BBC, VOA, and spiritual groups such as Falun Dafa. Along the years, Garden Networks has continued this effort and released product upgrades and new products, combating the escalating Internet blockade of the Chinese government.
The products of Garden Networks provide English and Chinese user interface and are also used by people in other countries to circumvent national Internet censorship or to improve Internet privacy and protect themselves from Internet identify theft.
Products
Garden
Garden is the first product release by Garden Networks. It works by providing an HTTP proxy server running on the user's local PC. The software then connects to one of the servers provided by Garden Networks to bypass firewalls at China's national gateway.
Garden provides an Internet Explorer Browser Helper Object (BHO) to enable a browser window to direct its traffic to the local proxy server. Activated by a blocked URL, Internet Explorer enters into a proxied mode automatically.
G2
A year after Garden was released, Garden Networks releases a new product called Garden G2. This software tool provides a different way of accessing the back-end servers, and a different way of engaging proxying. Unlike Garden, in G2, proxying is triggered by DNS resolution in order to provide support for a wider range of applications.
GTunnel
GTunnel is the latest product released in October 2007. It features a new transport protocol which enables GTunnel to provide local SOCKS proxy support, and new working modes. GTunnel version 1.1 provides a standard mode, which is the main working mode and provides the best data transfer performance by connecting to the back-end servers directly, a Skype mode, and a Tor mode that go through computers in these P2P network. GTunnel also has an improved user interface which features real-time traffic graphs.
GTunnel replaces the earlier Garden and G2 client software and becomes the main client software of Garden Networks.
GTunnel works on Linux through Wine support.
External links
Official web site
Portal for Chinese users
References
Internet privacy organizations
Politics and technology
Internet-related activism
Freedom of expression organizations
Internet access organizations
Technology companies of Canada
Networking companies of Canada
Human rights organizations based in Canada
Privacy in Canada
|
33651851
|
https://en.wikipedia.org/wiki/Marqise%20Lee
|
Marqise Lee
|
Marqise Lee (born November 25, 1991) is an American football wide receiver who is a free agent. He was drafted by the Jacksonville Jaguars in the second round of the 2014 NFL Draft. He played college football at USC, where he was the 2012 Biletnikoff Award winner as the nation's top receiver and a unanimous All-American.
Early years
Both of Lee's parents, Elton Lee and Anfernee Williams, are deaf; he communicates with them via sign language. Lee had a difficult childhood. His father was not regularly involved in his life. Lee spent the first twelve years of his life moving repeatedly between his mother and grandparents, both in low-income homes. The frequent moves forced him to repeat a grade early in elementary school. While Lee finished sixth grade, his grandfather died and his grandmother moved to the housing projects in Baldwin Village, Los Angeles; Lee and his younger sister chose not to move with her and instead became wards of the state. His two older brothers were involved in gangs: one, Terreal Reid, was murdered in a gang-related killing and the other, Donte Reid, was imprisoned in Arizona on a count of attempted murder. Lee previously tried to join the same gang, but his brothers prevented it. His sister still lives in the Los Angeles area.
When Lee started high school at Morningside High School, in Inglewood, California, he was living in a foster home. Lee played on an Amateur Athletic Union basketball team the summer after his freshman year of high school and became friends with Steven Hester Jr., a high school student from Inglewood attending the private Junípero Serra High School in Gardena, California. The Hester family liked Lee and, in September 2008, he moved in with them and began attending Serra. The family wanted to help Lee's younger sister, too, but were unable because of space and financial constraints. The Hesters became heavily involved in his life and continued to attend most of his games and practices at USC.
At Serra High School, Lee was a year behind a stand-out wide receiver, Robert Woods, who also went to USC. As a senior, Lee had had 57 receptions for 1,409 yards and 24 touchdowns as a wide receiver and 45 tackles and three interceptions as a defensive back. Lee was considered one of the top high school recruits in 2011. A number of major NCAA Division I FBS college football programs offered him athletic scholarships and Lee made official visits to Florida, Miami, and Oregon before choosing to attend USC.
Lee was also a sprinter and jumper for the Junípero Serra High School's track team. He set a personal-best leap of 13.59 meters in the triple jump at the 2010 CIF Division IV Meet. At the 2011 CIF Division IV Meet, he won the long jump with a leap of 7.52 meters, and recorded a career-best time of 10.74 seconds in the 100-meter dash, placing second. His jump of 7.52 meters was ranked 2nd best among all the 2011 prep class. He also ran the 200-meter dash in 22.11 seconds at the 2011 Del Rey League Championships, placing third in the finals.
College career
While attending the University of Southern California, Lee played for the USC Trojans football team from 2011 to 2013.
2011 season
As a true freshman at USC in 2011, he earned a starting job at wide receiver across from his former high school teammate Robert Woods. He finished the season with 73 receptions for 1,143 yards and 11 touchdowns; due to sanctions, the 10-2 Trojans were prohibited from playing in either the inaugural Pac-12 Conference Championship game or a post-season bowl game. The combined receptions by Lee and Woods (184) and receiving yards (2,435) in 2011 were the most by a pair of Trojans in a season; Lee was awarded the 2011 Pac-12 Freshman Offensive Co-Player of the Year and named to the All-Pac-12 second team.
2012 season
Against Arizona in 2012, Lee set the Pac-12 Conference record for receiving yards in a game with 16 receptions for 345 yards and two touchdowns. The following week, Lee had 251 return yards against Oregon, setting another conference record. He finished the season with 118 catches for 1,721 yards and 14 touchdowns and was named the 2012 Pac-12 Conference offensive player of the year. Lee won the 2012 Fred Biletnikoff Award as the top wide receiver in the nation, becoming the first Trojan to win the award. He was also a unanimous All-American.
2013 season
As a junior in 2013, Lee played in 11 games, recording 57 receptions for 791 yards and four touchdowns. On January 3, 2014, Lee announced his decision to forgo his senior season and enter the 2014 NFL Draft. During his three-year career with the Trojans, he had 248 receptions for 3,655 yards and 29 touchdowns.
Lee also competed on the USC track & field team in the spring, competing in the long jump and sprint relay. He qualified for the NCAA championships in the long jump at the 2011 NCAA West preliminary rounds, setting a career-best leap of 7.76 meters.
Professional career
Jacksonville Jaguars
2014
The Jacksonville Jaguars selected Lee in the second round (39th overall) of the 2014 NFL Draft. He was one of three USC Trojans to be selected that year and was the first of two wide receivers the Jaguars selected, along with Allen Robinson (61st overall).
On June 16, 2014, the Jacksonville Jaguars signed Lee to a four-year, $5.14 million contract that includes $3.18 million guaranteed and a signing bonus of $2.08 million.
Throughout training camp, Lee competed against Ace Sanders and Allen Robinson for the vacant starting wide receiver position that was left open after the suspension of Justin Blackmon. During camp, he sustained a wrist injury and then suffered a leg injury. Head coach Gus Bradley named Lee the starting wide receiver to start the regular season, alongside veteran Cecil Shorts.
He made his professional regular season debut and first career start during the Jacksonville Jaguars'
season-opener at the Philadelphia Eagles and caught a season-high six passes for 62-yards in their 34–17 loss. The following week, he caught two passes for 14-yards, but left the Jaguars' 41–10 loss at the Washington Redskins in the second quarter after sustaining a hamstring injury that sidelined him for the next three games (Weeks 3–5). On November 30, 2014, Lee caught six passes for a season-high 75-yards and caught his first career touchdown on a 30-yard pass from quarterback and fellow rookie Blake Bortles
during the Jaguars' 25–24 win over the New York Giants. He finished his rookie season and only season under offensive coordinator Jedd Fisch with 37 receptions for 422 yards and one touchdown in 13 games and eight starts.
2015
Lee competed against Allen Robinson and Allen Hurns for the vacant starting wide receiver position left by the departure of Cecil Shorts. He missed the majority of training camp after suffering a knee injury and then suffered a hamstring injury that allowed teammates to surpass him on the depth chart. Offensive coordinator Greg Olson named Lee the fourth wide receiver on the depth chart to begin the regular season, behind Allen Robinson, Allen Hurns, and Bryan Walters.
He was inactive for the Jacksonville Jaguars' season-opener against the Carolina Panthers due to his hamstring injury. He went on to miss another five games (Weeks 4–9) after aggravating his hamstring injury. On December 20, 2015, Lee caught two passes for 46-yards during the Jaguars' 23–17 loss to the Atlanta Falcons. The following week, he caught a season-high three passes for 26-yards and scored his only touchdown of the season in the Jaguars' 38–27 loss at the New Orleans Saints.
He finished with his second season with 15 receptions for 191 receiving yards and one touchdown in ten games and one start.
2016
Lee entered training camp competing against Rashad Greene to be the Jaguars' third wide receiver on their depth chart. Head coach Gus Bradley named him the third wide receiver to begin the regular season behind Allen Robinson and Hurns.
In Week 7, Lee made a season-high seven receptions for 107-yards during a 33–16 loss against the Oakland Raiders. Lee became one of the starting wide receivers for the remainder of the season after Allen Hurns suffered a hamstring injury that sidelined him for the last five games. On December 11, 2016, he caught five passes for a career-high 113 receiving yards in a 25–16 loss to the Minnesota Vikings. The following week, Lee returned a kickoff for a 100-yard touchdown as the Jaguars lost 21–20 at the Houston Texans. This marked his first career kick return for a touchdown. On December 24, 2016, he threw for his first career touchdown pass on a trick play call after receiving the football on a sweep and threw a 20-yard touchdown pass to a wide-open Blake Bortles, his quarterback. He also caught three passes for 37-yards and scored a 21-yard touchdown during the Jaguars' 38–17 win against the Tennessee Titans. He finished his last season under head coach Gus Bradley with 63 receptions for 851 receiving yards and three touchdowns in 16 games and six starts. He also returned 18 kickoffs for 545-yards and a touchdown.
2017
On January 9, 2017, the Jacksonville Jaguars announced that interim head coach and offensive line coach Doug Marrone would be promoted to their full-time head coach for the 2017 season. Throughout training camp, Lee and Allen Hurns competed to be a starting wide receiver alongside Allen Robinson. Offensive coordinator Nathaniel Hackett named Lee and Robinson the starting wide receivers to begin the season. Hurns replaced Robinson in the lineup after he tore his ACL in the Jaguars' season-opening 29–7 victory at the Houston Texans.
In Week 2, Lee caught seven passes for a season-high 76 receiving yards during the Jaguars' 37–16 loss to the Tennessee Titans. On November 5, 2017, he caught a season-high eight passes for 75-yards and a touchdown in a 23–7 victory against the Cincinnati Bengals. In Week 15, he suffered an ankle injury and left during the second quarter of the Jagaurs' 45–7 routing against the Houston Texans. He was inactive for the next two games (Weeks 16–17) as head coach Doug Marrone opted to rest his starters for the Jaguars' upcoming playoff games. Lee finished with 56 receptions for 702 yards and three touchdowns in 14 games and 14 starts.
The Jacksonville Jaguars finished atop the AFC South with a 10–6 record and secured a playoff berth. On January 7, 2018, Lee started his first career playoff game and had a five-yard rush and was only targeted once in the Jaguars' 10–3 victory over the Buffalo Bills in the AFC Wild Card Round. The Jaguars defeated the Pittsburgh Steelers in the AFC Divisional round and went on to lose 24–20 to the New England Patriots in the AFC Championship. Lee had four receptions for 42-yards during the Jaguars' playoff loss.
2018
On March 13, 2018, the Jaguars signed Lee to a four-year, $38 million contract extension. On August 25, 2018, in the third preseason game, Lee suffered a severe knee injury and had to undergo season-ending surgery.
2019
On October 29, 2019, Lee was placed on injured reserve with a knee injury. He finished the season with just three catches for 18 yards.
Lee was released by the Jaguars on April 20, 2020.
New England Patriots
On April 28, 2020, Lee signed a one-year contract with the New England Patriots. On August 2, 2020, he announced he would opt out of the 2020 season due to the COVID-19 pandemic. After opting out of the season, Lee was released on March 18, 2021.
San Francisco 49ers
On May 17, 2021, Lee signed a one-year contract with the San Francisco 49ers, but was released four days later.
NFL career statistics
See also
List of NCAA major college football yearly receiving leaders
References
External links
USC Trojans bio
Jacksonville Jaguars bio
1991 births
Living people
African-American players of American football
All-American college football players
American football return specialists
American football wide receivers
College men's track and field athletes in the United States
Jacksonville Jaguars players
New England Patriots players
San Francisco 49ers players
Players of American football from Inglewood, California
USC Trojans football players
21st-century African-American sportspeople
|
3190822
|
https://en.wikipedia.org/wiki/Microsimulation
|
Microsimulation
|
Microsimulation (from microanalytic simulation or microscopic simulation) is a category of computerized analytical tools that perform highly detailed analysis of activities such as highway traffic flowing through an intersection, financial transactions, or pathogens spreading disease through a population. Microsimulation is often used to evaluate the effects of proposed interventions before they are implemented in the real world. For example, a traffic microsimulation model could be used to evaluate the effectiveness of lengthening a turn lane at an intersection, and thus help decide whether it is worth spending money on actually lengthening the lane.
Introduction
Microsimulation can be distinguished from other types of computer modeling in looking at the interaction of individual units such as people or vehicles. Each unit is treated as an autonomous entity and the interaction of the units is allowed vary depending on stochastic (randomized) parameters. These parameters are intended to represent individual preferences and tendencies. For example, in a traffic model some drivers are cautious and wait for a large gap before turning, while others are aggressive and accept small gaps. Similarly, in a public health model individuals could vary in their resistance to a virus, as well as in personal habits that contribute to the spread of the virus (e.g. how frequently/thoroughly they wash their hands).
The International Microsimulation Association, defines microsimulation as a modelling technique that operates at the level of individual units such as persons, households, vehicles or firms. Within the model each unit is represented by a record containing a unique identifier and a set of associated attributes – e.g. a list of persons with known age, sex, marital and employment status; or a list of vehicles with known origins, destinations and operational characteristics. A set of rules (transition probabilities) are then applied to these units leading to simulated changes in state and behaviour. These rules may be deterministic (probability = 1), such as changes in tax liability resulting from changes in tax regulations, or stochastic (probability <=1), such as chance of dying, marrying, giving birth or moving within a given time period. In either case the result is an estimate of the outcomes of applying these rules, possibly over many time steps, including both total overall aggregate change and (importantly) the way this change is distributed in the population or location that is being modeled.
Econometric microsimulation
In applied econometrics research, microsimulation is used to simulate the behavior of individuals over time. The microsimulation can either be dynamic or static. If it is dynamic the behavior of people changes over time, whereas in the static case a constant behavior is assumed.
There are several microsimulation models for taxation, pensions, and other types of economic and financial activity. These models are typically implemented by government agencies or academics. One example is Pensim2 (a dynamic microsimulation pension model) which dynamically simulates pension income for the next 50 years in the United Kingdom. Euromod is a static microsimulation model for 15 European Union states. North American microsimulation models include the longitudinal, dynamic microsimulation CORSIM, and daughter models DYNACAN (Canada, terminated June 1, 2009) and POLISIM (United States). The U.S. Department of Health and Human Services uses the static microsimulation Transfer Income Model (TRIM) to understand the potential impacts of changes to tax, transfer, and health programs. A related example that provides spatially-detailed microsmulation of urban development is PECAS.
Econometric microsimulation models can be classified into two types:
Closed, longitudinal, dynamic microsimulation models (such as DYNACAN and Pensim2) begin with an initial population that is only modified by the simulated life events of the demographics modules, such as fertility, mortality and migration. Thus, at any time during the model run, the simulated population can be expected to remain a fully representative (synthetic) sample of the population that it is modeling.
Open models tend to focus on specific key individuals and generate their representativeness based on the population of said individuals. In such an environment, new individuals are added or removed from the population as needed in order to ensure an "appropriate" set of life events for the key individuals.
One of the clearest examples of this distinction is the treatment of marriage within the two types of models. While open models can simply generate an appropriate spouse for the key individual, closed models must, instead, determine which people within its population are likely to marry, and then to match them.
Traffic microsimulation
Microsimulation is also used in traffic modelling and is typified by software packages such as TransModeler, PTV VISSIM, TSIS-CORSIM, Cube Dynasim, LISA+, Quadstone Paramics, SiAS Paramics, Simtraffic, Aimsun, and MATSim. Analytical modelling software such as LINSIG, TRANSYT, TRANSYT-7F or SIDRA INTERSECTION represent a different class of models based on mathematical algorithms representing combinations of traffic model elements.
Traffic microsimulation models simulate the behaviour of individual vehicles within a predefined road network and are used to predict the likely impact of changes in traffic patterns resulting from changes to traffic flow or from changes to the physical environment.
Microsimulation has its greatest strength in modelling congested road networks due to its ability to simulate queueing conditions. Microsimulation models will continue to provide results at high degrees of saturation, up to the point of absolute gridlock. This capability makes these type of models very useful to analyse traffic operations in urban areas and city centers, including interchanges, roundabouts, unsignalized and signalized intersections, signal coordinated corridors, and area networks. Microsimulation also reflects even relatively small changes in the physical environment such as the narrowing of lanes or the relocation of junction stop lines.
In recent years, microsimulation modelling has gained attention in its ability to visually represent predicted traffic behaviour through 3D animation, enabling laypeople such as politicians and the general public to fully appreciate the impacts of a proposed scheme. Further advances are being made in this area with the merging of microsimulation model data with cinematic quality 3D animation and with virtual reality by such companies as FORUM8 in Japan.
Pedestrian or crowd microsimulation
Pedestrian or agent based microsimulation has grown in use and acceptance within industry in recent years; these systems focus on the simulation of individual people moving through an area of space with respect to analytics measures such as Space Utilisation, Level of Service, Density, Packing and Frustration.
Many current Traffic microsimulation software packages are combining traffic components and pedestrians to create a more complete systems while many transitional Crowd Simulation tools continue to be refined for use in large scale urban space design.
Microsimulation in health sciences
In health sciences microsimulation generates individual life histories. The technique is used when "stock-and-flow" type modeling of proportions (macrosimulation) of the population cannot sufficiently describe the system of interest. This type of modeling does not necessarily involve interaction between individuals (as described above) and in that case can generate individuals independently of each other, and can easily work with continuous time instead of discrete time steps.
Several examples of microsimulation models in health sciences have been brought together in the U.S. National Cancer Institute's CISNET program (http://cisnet.cancer.gov/). In Canada, the Population Health Model (POHEM) is a common platform that examines multiple chronic diseases, including diabetes, cardiovascular disease and arthritis.
Spatial microsimulation
Economic and health approaches to microsimulation provide insight into the impacts of changes in environmental, economic, or policy conditions on a given population of individuals. However, the impacts of many changes are context dependent, meaning that the same alteration (e.g. in income tax bands) may have desirable effects in some regions, but undesirable effects in others. This understanding lies at the root of spatial approaches to microsimulation. The term spatial microsimulation refers to a set of techniques that allow the characteristics of individuals living in a particular area to be approximated, based on a set of constraint variables that are known about the area. As with econometric microsimulation, spatial microsimulation can be either dynamic or static, and can include interacting or passive units.
Guy Orcutt is widely cited as the originator of spatial microsimulation. Spatial microsimulation has high computational and data requirements and some degree of computer programming is a prerequisite to setting up models. For these reasons, the technique is not widely used. However, a number of factors have led to rapid growth in the number of publications on spatial microsimulation within academic geography and related disciplines. These include:
The availability and low costs of powerful personal computers.
The emergence of user friendly and low-cost computer software with which microsimulation models can be created. Examples are R, Java, and Python, each of which can be classified as Free and open source software.
Improving data collection activities by governments, corporations, and non-profit organisations.
Improving data accessibility.
Programming languages and platforms
There are general purpose programming languages, in addition to topic-specific programs (see Traffic Simulation). Examples include JAS-mine, LIAM2, MODGEN, and OpenM++.
See also
Traffic flow
Dynamic microsimulation pension model
Further reading
Moscarola, F. C., Colombino, U., Figari, F., & Locatelli, M. (2014). Shifting Taxes from Labour to Property. A Simulation under Labour Market Equilibrium. IZA Discussion Papers 8832, Institute for the Study of Labor (IZA).
References
Econometric modeling
Simulation software
|
7385487
|
https://en.wikipedia.org/wiki/The%20Routers
|
The Routers
|
The Routers were an American instrumental group in the early 1960s.
Career
Formed in 1961 by Michael Z. Gordon, the Routers' recordings sometimes used session musicians in addition to the actual group with the exception of Gordon who also formed another successful group, the Marketts. Gordon composed another award-winning composition, "Out Of Limits" with the Marketts. Gordon played on almost all of the Routers and Marketts sessions.
The original line-up of the group was Al Kait, lead guitar; Lynn Frasier, tenor saxophone; Michael Zane Gordon, rhythm guitar, vocals; Scott Walker (then recording as Scott Engel), bass guitar; Randy Viers, drums.
The Routers first release in September 1962 was the guitar-driven instrumental "Let's Go (Pony)", which reached #19 on the Billboard chart. Its infectious "clap clap clap-clap-clap clap-clap-clap-clap Let's Go!" chant became a favorite of cheerleaders and crowds worldwide. Although the songwriting credits are given to local singer Lanny Duncan and his brother Robert Duncan, Lanny Duncan had previously recorded the original demo of the song in 1961 as a member of the Starlighters, featuring Tony Valentino on guitar and Jody Rich on bass. The demo was recorded in Glendale with engineer Eddie Brackett. Valentino and Rich went on to form the Standells in 1962.
The Routers' recording was instigated by record producer Joe Saraceno and his co-producer record producer and composer Michael Z. Gordon, who went on to compose "Apologize" by Ed Ames. Like many pop instrumentals recorded in Los Angeles, California, at this time, such as those by B. Bumble and the Stingers, it involved Tommy Tedesco on guitar, Gordon (guitar) , Plas Johnson (saxophone) and Earl Palmer (drums), and probably with Plas’ brother Ray Johnson on bass guitar as well as.
Later Routers recordings were also written by Gordon, including the songs "A-ooga" and "Big Band". Their recordings continued to be issued up to 1964 but with less commercial success, and involved Gordon (guitar) , Leon Russell (piano) and Hal Blaine (drums). The same group also recorded over the same period as the Marketts. Various studio and touring versions of the band also included Gordon, Randy Viers, and Scott Engel (later of the Walker Brothers).
Members
Original line-up
Al Kait - lead guitar
Lynn Frasier - tenor saxophone
Michael Zane Gordon - rhythm guitar, vocals
Scott Walker - bass guitar
Randy Viers - drums.
Later line-up
Michael Zane Gordon - guitar
Leon Russell - piano
Hal Blaine - drums
Discography
Studio albums
Let's Go! With The Routers [Warner Bros. Records. WS 1490] February 1963.
The Routers Play 1963's Great Instrumental Hits [Warner Bros. Records. WS 1524] November 1963.
Charge! [Warner Bros. Records. WS 1559] August 1964.
The Routers Play The Chuck Berry Song Book [Warner Bros. Records. WS 1595] April 1965.
Superbird'' [Mercury. SRM 1-682] September 1973.
Singles
"Let's Go (Pony)" b/w "Mashy" [Warner Bros. Records.5283] June 1962. #19.
"Make It Snappy" b/w "Half Time" [Warner Bros. Records.5332] January 1963. #115.
"Sting Ray" b/w "Snap Happy" [Warner Bros. Records.5349] March 1963. #50.
"A-Ooga b/w Big Band [Warner Bros. Records.5379] July 1963.
"Snap, Crackle And Pop b/w Amoeba [Warner Bros. Records.5403] December 1963.
"Crack Up" b/w "Let's Dance" [Warner Bros. Records. 5444] June 1964.
"Stamp And Shake" b/w "Ah-Ya" [Warner Bros. Records.5467] August 1964.
"The Time Funnel b/w Walkin' Back (Jan Davis & The Routers) [RCA 47-9018] November 1966.The Routers appear as Session Backing Group.
"Superbird b/w Sack O' Woe [Mercury. 73418] September 1973.
References
External links
Rock music groups from California
Surf music groups
American instrumental musical groups
Musical groups from Los Angeles
|
725948
|
https://en.wikipedia.org/wiki/Dave%20Taylor%20%28game%20programmer%29
|
Dave Taylor (game programmer)
|
Dave D. Taylor is an American game programmer, best known as a former id Software employee and noted for his work promoting Linux gaming. In 1993 he graduated from the University of Texas at Austin with a Bachelor of Science degree in electrical engineering.
id Software
Taylor worked for id Software between 1993 and 1996, and was during the time involved with the development of Doom and Quake. He created ports of both games to IRIX, AIX, Solaris and Linux, and helped program the Atari Jaguar ports of Doom and Wolfenstein 3D. He also considers himself to have been the "spackle coder" on Doom, for adding things such as the status bar, sound library integration, the automap, level transitions, cheat codes, and the network chat system. On Quake, he wrote the original sound engine, the DOS TCP/IP network library, and added VESA 2.0 support. One of the musical themes in Doom II, "The Dave D. Taylor Blues", was named after him by Robert Prince.
The 2003 book Masters of Doom: How Two Guys Created an Empire and Transformed Pop Culture mentions his habit of passing out from motion sickness after prolonged playing of Doom, and how the other employees would, after such incidents, sketch a body outline of his unconscious form with masking tape. After the success of the game, they bought him a couch to pass out on. His attempts to "talk up" Quake on-line, his purchase of an Acura NSX with Doom money, his friendship with American McGee, and his eventual departure from the company are also mentioned.
After id
Taylor founded a small game company called Crack dot Com from 1996 to 1998. Crack dot Com released only one game, Abuse, a PC platform shooter. In a 1997 interview, he claimed that he wasn't particularly proud of Abuse, and that "he set out to prove that a person could sell 50,000 copies of a so-so game." He then led the effort to build Golgotha, a first-person shooter / real-time strategy hybrid, but the company folded before its completion.
Between 1998 and 2001 he worked for Transmeta. He was president of Carbon6 from 2001 to 2002, there also working as lead designer and producer for the Game Boy Advance game Spy Kids Challenger. Since 2002 he has been vice president of Naked Sky Entertainment and since 2003 also an advisor and freelance game designer. He is also willing to act as a Linux game porter for pay projects.
In 2009, he produced Abuse Classic for the Apple iPhone and Beakiez for the PC.
References
External links
Dave Taylor's Official Website
Interview with Dave Taylor by James Hills (June 19, 1999)
Dave D. Taylor interview about Crack.Com from LinuxGames (2003)
Beakiez, a game by Taylor
American computer programmers
Video game programmers
Linux game porters
Cockrell School of Engineering alumni
Linux people
Year of birth missing (living people)
Place of birth missing (living people)
Living people
|
39493280
|
https://en.wikipedia.org/wiki/LinOTP
|
LinOTP
|
LinOTP is Linux-based software to manage authentication devices for two-factor authentication with one time passwords.
It is implemented as a web service based on the python framework Pylons. Thus it requires a web server to
run in.
LinOTP is mainly developed by the German company KeyIdentity GmbH. Its core components are licensed under the Affero General Public License.
It is an open source authentication server certified
by the OATH initiative for open authentication for its 2.4 version.
Overview
As a web service LinOTP provides a REST-like web API. All functions can be accessed via Pylons controllers.
Responses are returned as a JSON object.
LinOTP is designed in a modular way enabling user store modules and token modules. Thus it is capable of supporting a wide range of different tokens.
Features
Supported tokens:
SafeNet eToken Pass
SafeNet Safeword Alpine
mOTP
Lost token
Paper token
Feitian C-100 (HOTP)
Feitian]] C-200 (TOTP)
Feitian C-300 (OCRA)
Feitian c601 (optical OCRA)
Authenex A-Key V 3.6
Yubico Yubikey
Gemalto Ezio Token
Smartdisplayer
NagraID 106/103
NagraID 306 (OCRA)
BR Token SafeSIGNATURE
LSE Simple Pass token
LSE Remote Token
LSE Radius Token
LSE Tagespasswort Token
Apps for iPhone and Android like the Google Authenticator
Any HOTP/ TOTP and OCRA Token
Yubikey mass enrollment via CLI
support for token databases like sqlite, mysql, postgresql, oracle, db2
management via web interface or command line client
Users stored in flat files
PAM module
SAML
OpenID
FreeRADIUS connection via rlm_perl
Selfservice
Import of XML Token files
Management functions:
enroll/assign tokens
synchronize, resynchronize, automatic resychronization
activate/deactivate/delete tokens
autoassignment
lost token scenario
find token by OTP value
get OTP value
Detailed Policies Definitions
Sophisticated Audit API
Multitenancy
Source Code
Being written in Python the program itself comes as the source code.
See also
one-time password
Tokens
TOTP
HOTP
Multi-factor authentication
OTPW
privacyIDEA
OPIE Authentication System
Google Authenticator
Pylons project
References
Authentication methods
Applications of cryptography
Access control
Computer access control
Linux
Software using the GNU AGPL license
|
55747091
|
https://en.wikipedia.org/wiki/ONTAP
|
ONTAP
|
ONTAP or Data ONTAP or Clustered Data ONTAP (cDOT) or Data ONTAP 7-Mode is NetApp's proprietary operating system used in storage disk arrays such as NetApp FAS and AFF, ONTAP Select and Cloud Volumes ONTAP. With the release of version 9.0, NetApp decided to simplify the Data ONTAP name and removed word "Data" from it and remove 7-Mode image, therefore, ONTAP 9 is successor from Clustered Data ONTAP 8.
ONTAP includes code from Berkeley Net/2 BSD Unix, Spinnaker Networks technology and other operating systems.
ONTAP originally only supported NFS, but later added support for SMB, iSCSI and Fibre Channel Protocol (including Fibre Channel over Ethernet and FC-NVMe). On June 16, 2006, NetApp released two variants of Data ONTAP, namely Data ONTAP 7G and, with nearly a complete rewrite, Data ONTAP GX. Data ONTAP GX was based on grid technology acquired from Spinnaker Networks. In 2010 these software product lines merged into one OS - Data ONTAP 8, which folded Data ONTAP 7G onto the Data ONTAP GX cluster platform.
Data ONTAP 8 includes two distinct operating modes held on a single firmware image. The modes are called ONTAP 7-Mode and ONTAP Cluster-Mode. The last supported version of ONTAP 7-Mode issued by NetApp was version 8.2.5. All subsequent versions of ONTAP (version 8.3 and onwards) have only one operating mode - ONTAP Cluster-Mode.
The majority of large-storage arrays from other vendors tend to use commodity hardware with an operating system such as Microsoft Windows Server, VxWorks or tuned Linux. NetApp storage arrays use highly customized hardware and the proprietary ONTAP operating system, both originally designed by NetApp founders David Hitz and James Lau specifically for storage-serving purposes. ONTAP is NetApp's internal operating system, specially optimized for storage functions at high and low level. The original version of ONTAP had a proprietary non-UNIX kernel and a TCP/IP stack, networking commands, and low-level startup code from BSD. The version descended from Data ONTAP GX boots from FreeBSD as a stand-alone kernel-space module and uses some functions of FreeBSD (for example, it uses a command interpreter and drivers stack). ONTAP is also used for virtual storage appliances (VSA), such as ONTAP Select and Cloud Volumes ONTAP, both of which are based on a previous product named Data ONTAP Edge.
All storage array hardware include battery-backed non-volatile memory, which allows them to commit writes to stable storage quickly, without waiting on disks while virtual storage appliances using virtual nonvolatile memory.
Implementers often organize two storage systems in a high-availability cluster with a private high-speed link, either a Fibre Channel, InfiniBand, 10 Gigabit Ethernet, 40 Gigabit Ethernet or 100 Gigabit Ethernet. One can additionally group such clusters under a single namespace when running in the "cluster mode" of the Data ONTAP 8 operating system or on ONTAP 9.
Data ONTAP was made available for commodity computing servers with x86 processors, running atop VMware vSphere hypervisor, under the name "ONTAP Edge". Later ONTAP Edge was renamed to ONTAP Select and KVM added as supported hypervisor.
History
Data ONTAP, including WAFL, was developed in 1992 by David Hitz, James Lau, and Michael Malcolm. Initially, it supported NFSv2; the CIFS protocol was introduced to Data ONTAP 4.0 in 1996.
In April 2019, Octavian Tanase SVP ONTAP, posted a preview photo in his twitter of ONTAP running in Kubernetes as a container for a demonstration.
WAFL File System
The Write Anywhere File Layout (WAFL) is a file layout used by ONTAP OS that supports large, high-performance RAID arrays, quick restarts without lengthy consistency checks in the event of a crash or power failure, and growing the size of the filesystems quickly.
Storage Efficiencies
ONTAP OS contains a number of storage efficiencies, which are based on WAFL functionalities. Supported by all protocols, does not require licenses. In February 2018 NetApp claims AFF systems for its clients gain average 4.72:1 Storage Efficiency from deduplication, compression, compaction and clones savings. Starting with ONTAP 9.3 offline deduplication and compression scanners start automatically by default and based on percentage of new data written instead of scheduling.
Data Reduction efficiency is summary of Volume and Aggregate Efficiencies and Zero-block deduplication:
Volume Efficiencies could be enabled/disabled individually and on volume-by-volume basis:
Offline Volume Deduplication, which works on 4KB block level
Additional efficiency mechanism were introduced later, such as Offline Volume Compression also known as Post-process (or Background) Compression, there are two types: Post-process secondary compression and Post-process adaptive compression
Inline Volume Deduplication and Inline Volume Compression are compress some of the data on the fly before it reaches the disks and designed to leave some of the data in uncompressed form if it considered by ONTAP to take a long time to process them on the fly, and to leverage other storage efficiency mechanisms for this uncompressed data later. There are two types of Inline Volume Compression: Inline adaptive compression and Inline secondary compression
Aggregate Level Storage Efficiencies includes:
Data Compaction is another mechanism used to compress many data blocks smaller than 4KB to a single 4KB block
Inline Aggregate-wide data deduplication (IAD) and Post-process aggregate deduplication also known as Cross-Volume Deduplication shares common blocks between volumes on an aggregate. IAD can throttle itself when storage system crosses a certain threshold. The current limit of physical space of a single SSD aggregate is 800TiB
Inline Zero-block Deduplication deduplicate zeroes on the fly before they reach disks
Snapshots and FlexClones are also considered efficiency mechanisms. Starting with 9.4 ONTAP by default deduplicate data across active file system and all the snapshots on the volume, saving from snapshot sharing is a magnitude of number of snapshots, the more snapshots the more savings will be, therefore snapshot sharing gives more savings on SnapMirror destination systems.
Thin Provisioning
Cross-Volume Deduplication storage efficiency features work only for SSD media. Inline and Offline Deduplication mechanisms that leverage databases consist of links of data blocks and checksums, for those data blocks that been handled by the deduplication process. Each deduplication database is located on each volume and aggregates where deduplication is enabled. All Flash FAS systems does not support Post-process Compression.
Order of Storage Efficiencies execution is as follows:
Inline Zero-Block deduplication
Inline Compression: for files that could be compressed to the 8KB adaptive compression used, for files more than 32KB secondary compression used
Inline Deduplication: Volume first, then Aggregate
Inline Adaptive Data Compaction
Post-process Compression
Post-process Deduplication: Volume first, then Aggregate
Aggregates
One or multiple RAID groups form an "aggregate", and within aggregates ONTAP operating system sets up "flexible volumes" (FlexVol) to actually store data that users can access. Similarly to RAID 0, each aggregate consolidates space from underlying protected RAID groups to provide one logical piece of storage for flexible volumes. Alongside with aggregates consists of NetApp's own disks and RAID groups aggregates could consist of LUNs already protected with third-party storage systems with FlexArray, ONTAP Select or Cloud Volumes ONTAP. Each aggregate could consist of either LUNs or with NetApp's own RAID groups. An alternative is "Traditional volumes" where one or more RAID groups form a single static volume. Flexible volumes offer the advantage that many of them can be created on a single aggregate and resized at any time. Smaller volumes can then share all of the spindles available to the underlying aggregate and with a combination of storage QoS allows to change the performance of flexible volumes on the fly while Traditional volumes don't. However, Traditional volumes can (theoretically) handle slightly higher I/O throughput than flexible volumes (with the same number of spindles), as they do not have to go through an additional virtualization layer to talk to the underlying disk. Aggregates and traditional volumes can only be expanded, never contracted. Current maximum aggregate physical useful space size is 800 TiB for All-Flash FAS Systems.
7-Mode and earlier
The first form of redundancy added to ONTAP was the ability to organize pairs of NetApp storage systems into a high-availability cluster (HA-Pair); an HA-Pair could scale capacity by adding disk shelves. When the performance maximum was reached with an HA-Pair, there were two ways to proceed: one was to buy another storage system and divide the workload between them, another was to buy a new, more powerful storage system and migrate all workload to it. All the AFF and FAS storage systems were usually able to connect old disk shelves from previous models—this process is called head-swap. Head-swap requires downtime for re-cabling operations and provides access to old data with new controller without system re-configuration.
From Data ONTAP 8, each firmware image contains two operating systems, named "Modes": 7-Mode and Cluster-Mode. Both modes could be used on the same FAS platform, one at a time. However, data from each of the modes wasn't compatible with the other, in case of a FAS conversion from one mode to another, or in case of re-cabling disk shelves from 7-Mode to Cluster-Mode and vice versa.
Later, NetApp released the 7-Mode transition Tool (7MTT), which is able to convert data on old disk shelves from 7-Mode to Cluster-Mode. It is named Copy-Free Transition, a process which required downtime. With version 8.3, 7-Mode was removed from the Data ONTAP firmware image.
Clustered ONTAP
Clustered ONTAP is a new, more advanced OS, compared to its predecessor Data ONTAP (version 7 and version 8 in 7-Mode), which is able to scale out by adding new HA-pairs to a single namespace cluster with transparent data migration across the entire cluster. In version 8.0, a new aggregate type was introduced, with a size threshold larger than the 16-terabyte (TB) aggregate size threshold that was supported in previous releases of Data ONTAP, also named the 64-bit aggregate.
In version 9.0, nearly all of the features from 7-mode were successfully implemented in ONTAP (Clustered) including SnapLock, while many new features that were not available in 7-Mode were introduced, including features such as FlexGroup, FabricPool, and new capabilities such as fast-provisioning workloads and Flash optimization.
The uniqueness of NetApp's Clustered ONTAP is in the ability to add heterogeneous systems (where all systems in a single cluster do not have to be of the same model or generation) to a single cluster. This provides a single pane of glass for managing all the nodes in a cluster, and non-disruptive operations such as adding new models to a cluster, removing old nodes, online migration of volumes, and LUNs while data is contiguously available to its clients. In version 9.0, NetApp renamed Data ONTAP to ONTAP.
Data protocols
ONTAP is considered to be a unified storage system, meaning that it supports both block-level (FC, FCoE, NVMeoF and iSCSI) & file-level (NFS, pNFS, CIFS/SMB) protocols for its clients. SDS versions of ONTAP (ONTAP Select & Cloud Volumes ONTAP) do not support FC, FCoE or NVMeoF protocols due to their software-defined nature.
NFS
NFS was the first protocol available in ONTAP. The latest versions of ONTAP 9 support NFSv2, NFSv3, NFSv4 (4.0 and 4.1) and pNFS. Starting with ONTAP 9.5, 4-byte UTF-8 sequences, for characters outside the Basic Multilingual Plane, are supported in names for files and directories.
SMB/CIFS
ONTAP supports CIFS 2.0 and higher up to SMB 3.1. Starting with ONTAP 9.4 SMB Multichannel, which provides functionality similar to multipathing in SAN protocols, is supported. Starting with ONTAP 8.2 CIFS protocol supports Continuous Availability (CA) with SMB 3.0 for Microsoft Hyper-V over SMB and SQL Server over SMB. ONTAP supports SMB encryption, which is also known as sealing. Accelerated AES instructions (Intel AES NI) encryption is supported in SMB 3.0 and later.
FCP
ONTAP on physical appliances supports FCoE as well as FC protocol, depending on HBA port speed.
iSCSI
iSCSI Data Center Bridging (DCB) protocol supported with A220/FAS2700 systems.
NVMeoF
NVMe over Fabrics (NVMeoF) refers to the ability to utilize NVMe protocol over existed network infrastructure like Ethernet (Converged or traditional), TCP, Fiber Channel or InfiniBand for transport (as opposite to run NVMe over PCI). NVMe is SAN block level data storage protocol. NVMeoF supported only on All-Flash A-Systems and not supported for low-end A200 and A220 systems. Starting with ONTAP 9.5 ANA protocol supported which provide, similarly to ALUA multi-pathing functionality to NVMe. ANA for NVMe currently supported only with SUSE Enterprise Linux 15. FC-NVMe without ANA supported with SUSE Enterprise Linux 12 SP3 and RedHat Enterprise Linux 7.6.
FC-NVMe
FC-NVMe Supported on systems with 32Gbps FC ports or higher speeds. The supported Operation Systems with FC-NVMe are: Oracle Linux, VMware, Windows Server, SUSE Linux, RedHat Linux.
High Availability
High Availability (HA) is clustered configuration of a storage system with two nodes or HA pairs, which aims to ensure an agreed level of operational during expected and unexpected events like reboots, software or firmware updates.
HA Pair
Even though a single HA pair consists of two nodes (or controllers), NetApp has designed it in such a way that it behaves as a single storage system. HA configurations in ONTAP employ a number of techniques to present the two nodes of the pair as a single system. This allows the storage system to provide its clients with nearly-uninterruptable access to their data should a node either fail unexpectedly or need to be rebooted in an operation known as a "takeover."
For example: on the network level, ONTAP will temporarily migrate the IP address of the downed node to the surviving node, and where applicable it will also temporarily switch ownership of FC WWPNs from the downed node to the surviving node. On the data level, the contents of the disks that are assigned to the downed node will automatically be available for use via the surviving node.
FAS and AFF storage systems use enterprise level HDD and SSD drives that are housed within disk shelves that have two bus ports, with one port connected to each controller. All of ONTAP's disks have an ownership marker written to them to reflect which controller in the HA pair owns and serves each individual disk. An Aggregate can include only disks owned by a single node, therefore each aggregate owned by a node and any upper objects such as FlexVol volumes, LUNs, File Shares are served with a single controller. Each controller can have its own disks and aggregates and serve them, therefore such HA pair configurations are called Active/Active where both nodes are utilized simultaneously even though they are not serving the same data.
Once the downed node of the HA pair has been repaired, or whatever maintenance window that necessitated a takeover has been completed, and the downed node is up and running without issue, a "giveback" command can be issued to bring the HA pair back to "Active/Active" status.
HA interconnect
High-availability clusters (HA clusters) are the first type of clusterization introduced in ONTAP systems. It aimed to ensure an agreed level of operation. It is often confused with the horizontal scaling ONTAP clusterization that came from the Spinnaker acquisition; therefore, NetApp, in its documentation, refers to an HA configuration as an HA pair rather than as an HA cluster.
An HA pair uses some form of network connectivity (often direct connectivity) for communication between the servers in the pair; this is called an HA interconnect (HA-IC). The HA interconnect can use Ethernet or InfiniBand as the communication medium. The HA interconnect is used for non-volatile memory log (NVLOG) replication using RDMA technology and for some other purposes only to ensure an agreed level of operational during events like reboots always between two nodes in a HA pair configuration. ONTAP assigns dedicated, non-sharable HA ports for HA interconnect which could be external or build in chassis (and not visible from the outside). The HA-IC should not be confused with the intercluster or intracluster interconnect that is used for SnapMirror and that can coexist with data protocols on data ports or with Cluster Interconnect ports used for horizontal scaling & online data migration across the multi-node cluster. HA-IC interfaces are visible only on the node shell level. Starting with A320 HA-IC and Cluster interconnect traffic start to use the same ports.
MetroCluster
MetroCluster (MC) is an additional level of data availability to HA configurations and supported only with FAS and AFF storage systems, later SDS version of MetroCluster was introduced with ONTAP Select & Cloud Volumes ONTAP products. In MC configuration two storage systems (each system can be single node or HA pair) form MetroCluster, often two systems located on two sites with the distance between them up to 300 km therefore called geo-distributed system. Plex is the key underlying technology which synchronizes data between two sites in MetroCluster. In MC configurations NVLOG also replicated between storage systems between sites but uses dedicated ports for that purpose, in addition to HA interconnect. Starting with ONTAP 9.5 SVM-DR supported in MetroCluster configurations.
MetroCluster SDS
Is a feature of ONTAP Select software, similarly to MetroCluster on FAS/AFF systems MetroCluster SDS (MC SDS) allows to synchronously replicate data between two sites using SyncMirror and automatically switch to survived node transparently to its users and applications. MetroCluster SDS work as ordinary HA pare so data volumes, LUNs and LIFs could be moved online between aggregates and controllers on both sites, which is slightly different than traditional MetroCluster on FAS/AFF systems where data cloud be moved across storage cluster only within site where data originally located. In traditional MetroCluster the only way for applications to access data locally on remote site is to disable one entire site, this process called switchover where in MC SDS ordinary HA process occurs. MetroCluster SDS uses ONTAP Deploy as the mediator (in FAS and AFF world this functionality known as MetroCluster tiebreaker) which came with ONTAP Select as a bundle and generally used for deploying clusters, installing licenses and monitoring them.
Horizontal Scaling Clusterization
Horizontal scaling ONTAP clusterization came from Spinnaker acquisitions and often referred by NetApp as "Single Namespace", "Horizontal Scaling Cluster" or "ONTAP Storage System Cluster" or just "ONTAP Cluster" and therefore often confused with HA pair or even with MetroCluster functionality. While MetroCluster and HA are Data Protection technologies, single namespace clusterization does not provide data protection. ONTAP Cluster is formed out of one or few HA pairs and adds to ONTAP system Non-Disruptive Operations (NDO) functionality such as non-disruptive online data migration across nodes in the cluster and non-disruptive hardware upgrade. Data migration for NDO operations in ONTAP Cluster require dedicated Ethernet ports for such operations called as cluster interconnect and does not use HA interconnect for this purposes. Cluster interconnect and HA interconnect could not share same ports. Cluster interconnect with a single HA pair could have directly connected cluster interconnect ports while systems with 4 or more nodes require two dedicated Ethernet cluster interconnect switches. ONTAP Cluster could consist only with even number of nodes (they must be configured as HA pairs) except for Single-node cluster. Single-node cluster ONTAP system also called non-HA (stand-alone). ONTAP Cluster managed with a single pain of glass built-in management with Web-based GUI, CLI (SSH and PowerShell) and API. ONTAP Cluster provides Single Name Space for NDO operations through SVM. Single Namespace in ONTAP system is a name for collection of techniques used by Cluster to separate data from front-end network connectivity with data protocols like FC, FCoE, FC-NVMe, iSCSI, NFS and CIFS and therefore provide kind of data virtualization for online data mobility across cluster nodes. On network layer Single Namespace provide a number of techniques for non-disruptive IP address migration, like CIFS Continuous Availability (Transparent Failover), NetApp's Network Failover for NFS and SAN ALUA and path election for online front-end traffic re-balancing with data protocols. NetApp AFF and FAS storage systems can consists of different HA pairs: AFF and FAS, different models and generations and can include up to 24 nodes with NAS protocols or 12 nodes with SAN protocols. SDS systems can't intermix with physical AFF or FAS storage systems.
Storage Virtual Machine
Also known as Vserver or sometimes SVM. Storage Virtual Machine (SVM) is a layer of abstraction, and alongside with other functions, it virtualizes and separates physical front-end data network from data located on FlexVol volumes. It is used for Non-Disruptive Operations and Multi-Tenancy. It also forms as the highest form of logical construct available with NetApp. A SVM can not be mounted under another SVM, therefore it can be referred to a Global Namespace.
SVM divides storage system into slices so few divisions or even organizations can share a storage system without knowing and interfering with each other while using same ports, data aggregates and nodes in the cluster and using separate FlexVol volumes and LUNs. One SVM cannot create, delete, change or even see objects of another SVM so for SVM owners such an environment looks like they are only users on the entire storage system cluster.
Non Disruptive Operations
There few Non Disruptive Operations (NDO) operations with (Clustered) ONTAP system. NDO data operations include: aggregate relocation within an HA pair between nodes, FlexVol volume online migration (known as Volume Move operation) across aggregates and nodes within Cluster, LUNs migration (known as LUN Move operation) between FlexVol volumes within Cluster. LUN move and Volume Move operations use Cluster Interconnect ports for data transfer (HA-CI is not in use for such operations). SVM behave differently with network NDO operations, depending on front-end data protocol. To decrease latency to its original level FlexVol volumes and LUNs have to be located on the same node with network address through which the clients access storage system, so network address could be created for SAN or moved for NAS protocols. NDO operations are free functionality.
NAS LIF
For NAS front-end data protocols there are NFSv2, NFSv3, NFSv4 and CIFSv1, SMBv2 and SMB v3 which do not provide network redundancy with the protocol itself, so they rely on storage and switch functionalities for this matter. For this reason ONTAP support Ethernet Port Channel and LACP with its Ethernet network ports on L2 layer (known in ONTAP as interface group, ifgrp), within a single node and also non-disruptive Network Fail Over between nodes in cluster on L3 layer with migrating Logical Interfaces (LIF) and associated IP addresses (similar to VRRP) to survived node and back home when failed node restored.
SAN LIF
For front-end data SAN protocols. ALUA feature used for network load balancing and redundancy in SAN protocols so all the ports on node where data located are reported to clients as active preferred path with load balancing between them while all other network ports on all other nodes in the cluster are active non-preferred path so in case of one port or entire node goes down, client will have access to its data using non-preferred path. Starting with ONTAP 8.3 Selective LUN Mapping (SLM) was introduced to reduce the number of paths to the LUN and removes non-optimized paths to the LUN through all other cluster nodes except for HA partner of the node owning the LUN so cluster will report to the host paths only from the HA pare where LUN is located. Because ONTAP provides ALUA functionality for SAN protocols, SAN network LIFs do not migrate like with NAS protocols. When data or network interfaces migration is finished it is transparent to storage system's clients due to ONTAP Architecture and can cause temporary or permanent data indirect access through ONTAP Cluster interconnect (HA-CI is not in use for such situations) which will slightly increase latency for the clients. SAN LIFs used for FC, FCoE, iSCSi & FC-NVMe protocols.
VIP LIF
VIP (Virtual IP) LIFs require Top-of-the-Rack BGP Router used. BGP data LIFs alongside with NAS LIFs also can be used with Ethernet for NAS environment but in case of BGP LIFs, automatically load-balance traffic based on routing metrics and avoid inactive, unused links. BGP LIFs provide distribution across all the NAS LIFs in a cluster, not limited to a single node as in NAS LIFs. BGP LIFs provide smarter load balancing than it was realized with hash algorithms in Ethernet Port Channel & LACP with interface groups. VIP LIF interfaces are tested and can be used with MCC and SVM-DR.
Management interfaces
Node management LIF interface can migrate with associated IP address across Ethernet ports of a single node and available only while ONTAP running on the node, usually located on e0M port of the node; Node management IP sometimes used by cluster admin to communicate with a node to cluster shell in rare cases where commands have to be issued from a particular node. Cluster Management LIF interface with associated IP address available only while the entire cluster is up & running and by default can migrate across Ethernet ports, often located on one of the e0M ports on one of the cluster nodes and used for cluster administrator for management purposes; it used for API communications & HTML GUI & SSH console management, by default ssh connect administrator with cluster shell. Service Processor (SP) interfaces available only at hardware appliances like FAS & AFF and allows ssh out-of-band console communications with an embedded small computer installed on controller mainboard and similarly to IPMI allows to connect, monitor & manage controller even if ONTAP OS is not booted, with SP it is possible to forcibly reboot or halt a controller and monitor coolers & temperature, etc.; connection to SP by ssh brings administrator to SP console but when connected to SP it is possible to switch to cluster shell through it; each controller has one SP which does not migrate like some other management interfaces. Usually, e0M and SP both lives on a single management (wrench) physical Ethernet port but each has its own dedicated MAC address. Node LIFs, Cluster LIF & SP often using the same IP subnet. SVM management LIF, similarly to cluster management LIF can migrate across all the Ethernet ports on the nodes of the cluster but dedicated for a single SVM management; SVM LIF does not have GUI capability and can facilitate only for API Communications & SSH console management; SVM management LIF can live on e0M port but often located on a data port of a cluster node on a dedicated management VLAN and can be different from IP subnets that node & cluster LIFs.
Cluster interfaces
The cluster interconnect LIF interfaces using dedicated Ethernet ports and cannot share ports with management and data interfaces and for horizontal scaling functionality at times when like a LUN or a Volume migrates from one node of the cluster to another; cluster interconnect LIF similarly to node management LIFs can migrate between ports of a single node. Intercluster interface LIFs can live and share the same Ethernet ports with data LIFs and used for SnapMirror replication; intercluster interface LIFs, similarly to node management & LIFs cluster interconnect can migrate between ports of a single node.
Multi Tenancy
ONTAP provide two techniques for Multi Tenancy functionality like Storage Virtual Machines and IP Spaces. On one hand SVMs are similar to Virtual Machines like KVM, they provide visualization abstraction from physical storage but on another hand quite different because unlike ordinary virtual machines SVMs does not allow to run third party binary code like in Pure storage systems; they just provide virtualized environment and storage resources instead. Also SVMs unlike ordinary virtual machines do not run on a single node but for the end user it looks like an SVM runs as a single entity on each node of the whole cluster. SVM divides storage system into slices, so a few divisions or even organizations can share a storage system without knowing and interfering with each other while utilizing same ports, data aggregates and nodes in the cluster and using separate FlexVol volumes and LUNs. Each SVM can run its own frontend data protocols, set of users, use its own network addresses and management IP. With use of IP Spaces users can have the same IP addresses and networks on the same storage system without interfering. Each ONTAP system must run at least one Data SVM in order to function but may run more. There are a few levels of ONTAP management and Cluster Admin level has all of the available privileges. Each Data SVM provides to its owner vsadmin which has nearly full functionality of Cluster Admin level but lacks physical level management capabilities like RAID group configuration, Aggregate configuration, physical network port configuration. However, vsadmin can manage logical objects inside an SVM like create, delete and configure LUNs, FlexVol volumes and network addresses, so two SVMs in a cluster can't interfere with each other. One SVM cannot create, delete, modify or even see objects of another SVM, so for SVM owners such an environment looks like they are the only users in the entire storage system cluster. Multi Tenancy is free functionality in ONTAP.
FlexClone
FlexClone is a licensed feature, used for creating writable copies of volumes, files or LUNs. In case of volumes, FlexClone acts as a snapshot but allows to write into it, while an ordinary snapshot allows only to read data from it. Because WAFL architecture FlexClone technology copies only metadata inodes and provides nearly instantaneous data copying of a file, LUN or volume regardless of its size.
SnapRestore
SnapRestore is a licensed feature, used for reverting active file system of a FlexVol to a previously created snapshot for that FlexVol with restoring metadata inodes in to active file system. SnapRestore is used also for a single file restore or LUN restore from a previously created snapshot for the FlexVol where that object located. Without SnapRestore license in NAS environment it is possible to see snapshots in network file share and be able to copy directories and files for restore purposes. In SAN environment there is no way of doing restore operations similar to NAS environment. It is possible to copy in both SAN and NAS environments files, directories, LUNs and entire FlexVol content with ONTAP command which is free. Process of copying data depend on the size of the object and could be time consuming, while SnapRestore mechanism with restoring metadata inodes in to active file system almost instant regardless of the size of the object been restored to its previous state.
FlexGroup
FlexGroup is a free feature introduced in version 9, which utilizes the clustered architecture of the ONTAP operating system. FlexGroup provides cluster-wide scalable NAS access with NFS and CIFS protocols. A FlexGroup Volume is a collection of constituent FlexVol volumes distributed across nodes in the cluster called just "Constituents", which are transparently aggregated in a single space. Therefore, FlexGroup Volume aggregates performance and capacity from all the Constituents and thus from all nodes of the cluster where they located. For the end user, each FlexGroup Volume is represented by a single, ordinary file-share. The full potential of FlexGroup will be revealed with technologies like pNFS (currently not supported with FlexGroup), NFS Multipathing (session trunking, also not available in ONTAP) SMB multichannel (currently not supported with FlexGroup), SMB Continuous Availability (FlexGroup with SMB CA Supported with ONTAP 9.6), and VIP (BGP). The FlexGroup feature in ONTAP 9 allows to massively scale in a single namespace to over 20PB with over 400 billion files, while evenly spreading the performance across the cluster. Starting with ONTAP 9.5 FabricPool supported with: FlexGroup, it is recommended to have all the constituent volumes to backup to a single S3 bucket; supports SMB features for native file auditing, FPolicy, Storage Level Access Guard (SLA), copy offload (ODX) and inherited watches of changes notifications; Quotas and Qtree. SMB Contiguous Availability (CA) supported on FlexGroup allows running MS SQL & Hyper-V on FlexGroup, and FlexGroup supported on MetroCluster.
SnapMirror
Snapshots form the basis for NetApp's asynchronous disk-to-disk replication (D2D) technology, SnapMirror, which effectively replicates Flexible Volume snapshots between any two ONTAP systems. SnapMirror is also supported from ONTAP to Cloud Backup and from SolidFire to ONTAP systems as part of NetApp's Data Fabric vision. NetApp also offers a D2D backup and archive feature named SnapVault, which is based on replicating and storing snapshots. Open Systems SnapVault allows Windows and UNIX hosts to back up data to an ONTAP, and store any filesystem changes in snapshots (not supported in ONTAP 8.3 and onwards). SnapMirror is designed to be part of a Disaster recovery plan: it stores an exact copy of data on time when snapshot was created on the disaster recovery site and could keep the same snapshots on both systems. SnapVault, on the other hand, is designed to store less snapshots on the source storage system and more Snapshots on a secondary site for a long period of time.
Data captured in SnapVault snapshots on destination system could not be modified nor accessible on destination for read-write, data can be restored back to primary storage system or SnapVault snapshot could be deleted. Data captured in snapshots on both sites with both SnapMirror and SnapVault can be cloned and modified with the FlexClone feature for data cataloging, backup consistency and validation, test and development purposes etc.
Later versions of ONTAP introduced cascading replication, where one volume could replicate to another, and then another, and so on. Configuration called fan-out is a deployment where one volume replicated to multiple storage systems. Both fan-out and cascade replication deployments support any combination of SnapMirror DR, SnapVault, or unified replication. It is possible to use fan-in deployment to create data protection relationships between multiple primary systems and a single secondary system: each relationship must use a different volume on the secondary system. Starting with ONTAP 9.4 destination SnapMirror & SnapVault systems enable automatic inline & offline deduplication by default.
Intercluster is a relationship between two clusters for SnapMirror, while Intracluster is opposite to it and used for SnapMirror relationship between storage virtual machines (SVM) in a single cluster.
SnapMirror can operate in version-dependent mode, where two storage systems must run on the same version of ONTAP or in version-flexible mode. Types of SnapMirror replication:
Data Protection (DP): Also known as SnapMirror DR. Version-dependent replication type originally developed by NetApp for Volume SnapMirror, destination system must be same or higher version of ONTAP. Not used by default in ONTAP 9.3 and higher. Volume-level replication, block-based, metadata independent, uses Block-Level Engine (BLE).
Extended Data Protection (XDP): Used by SnapMirror Unified replication and SnapVault. XDP uses the Logical Replication Engine (LRE) or if volume efficiency different on the destination volume the Logical Replication Engine with Storage Efficiency (LRSE). Used as Volume-level replication but technologically could be used for directory-based replication, inode-based, metadata dependent (therefore not recommended for NAS with millions of files).
Load Sharing (LS): Mostly used for internal purposes like keeping copies of root volume for an SVM.
SnapMirror to Tape (SMTape): is Snapshot copy-based incremental or differential backup from volumes to tapes; SMTape feature performing a block-level tape backup using NDMP-compliant backup applications such as CommVault Simpana.
SnapMirror-based technologies:
Unified replication: A volume with Unified replication can get both SnapMirror and SnapVault snapshots. Unified replication is combination of SnapMirror Unified replication and SnapVault which using a single replication connection. Both SnapMirror Unified replication and SnapVault are using same XDP replication type. SnapMirror Unified Replication is also known as Version-flexible SnapMirror. Version-flexible SnapMirror/SnapMirror Unified Replication introduced in ONTAP 8.3 and removes the restriction to have the destination storage use the same, or higher, version of ONTAP.
SVM-DR (SnapMirror SVM): replicates all volumes (exceptions allowed) in a selected SVM and some of the SVM settings, replicated settings depend on protocol used (SAN or NAS)
Volume Move: Also known as DataMotion for Volumes. SnapMirror replicates volume from one aggregate to another within a cluster, then I/O operations stops for acceptable timeout for end clients, final replica transferred to destination, source deleted and destination becomes read-write accessible to its clients
SnapMirror is a licensed feature, a SnapVault license is not required if a SnapMirror license is already installed.
SVM-DR
SVM DR based on SnapMirror technology which transferring all the volumes (exceptions allowed) and data in them from a protected SVM to a DR site. There are two modes for SVM DR: identity preserve and identity discard. With Identity discard mode, on the one hand, data in volumes copied to the secondary system and DR SVM does not preserve information like SVM configuration, IP addresses, CIFS AD integration from original SVM. On another hand in identity discard mode, data on the secondary system can be brought online in read-write mode while primary system online too, which might be helpful for DR testing, Test/Dev and other purposes. Therefore, identity discard requires additional configuration on the secondary site in the case of disaster occurs on the primary site.
In the identity preserve mode, SVM-DR copying volumes and data in them and also information like SVM configuration, IP addresses, CIFS AD integration which requires less configuration on DR site in case of disaster event on primary site but in this mode, the primary system must be offline to ensure there will be no conflict.
SnapMirror Synchronous
SnapMirror Sync (SM-S) for short is zero RPO data replication technology previously available in 7-mode systems and was not available in (clustered) ONTAP until version 9.5. SnapMirror Sync replicates data on Volume level and has requirements for RTT less than 10ms which gives distance approximately of 150 km. SnapMirror Sync can work in two modes: Full Synchronous mode (set by default) which guarantees zero application data loss between two sites by disallowing writes if the SnapMirror Sync replication fails for any reason. Relaxed Synchronous mode allows an application to write to continue on primary site if the SnapMirror Sync fails and once the relationship resumed, automatic re-sync will occur. SM-S supports FC, iSCSI, NFSv3, NFSv4, SMB v2 & SMB v3 protocols and have the limit of 100 volumes for AFF, 40 volumes for FAS, 20 for ONTAP Select and work on any controllers which have 16GB memory or more. SM-S is useful for replicating transactional logs from: Oracle DB, MS SQL, MS Exchange etc. Source and destination FlexVolumes can be in a FabricPool aggregate but must use backup policy, FlexGroup volumes and quotas are not currently supported with SM-S. SM-S is not free feature, the license is included in the premium bundle. Unlike SyncMirror, SM-S not uses RAID & Plex technologies, therefore, can be configured between two different NetApp ONTAP storage systems with different disk type & media.
FlexCache Volumes
FlexCache technology previously available in 7-mode systems and was not available in (clustered) ONTAP until version 9.5. FlexCache allows serving NAS data across multiple global sites with file locking mechanisms. FlexCache volumes can cache reads, writes, and metadata. Writes on the edge generating push operation of the modified data to all the edge ONTAP systems requested data from the origin, while in 7-mode all the writes go to the origin and it was an edge ONTAP system's job to check the file haven't been updated. Also in FlexCache volumes can be less size that original volume, which is also an improvement compare to 7-mode. Initially, only NFS v3 supported with ONTAP 9.5. FlexCache volumes are sparsely-populated within an ONTAP cluster (intracluster) or across multiple ONTAP clusters (inter-cluster). FlexCache communicates over Intercluster Interface LIFs with other nodes. Licenses for FlexCache based on total cluster cache capacity and not included in the premium bundle. FAS, AFF & ONTAP Select can be combined to use FlexCache technology. Allowed to create 10 FlexCache volumes per origin FlexVol volume, and up to 10 FlexCache volumes per ONTAP node. The original volume must be stored in a FlexVol while all the FlexCache Volumes will have FlexGroup volume format.
SyncMirror
Data ONTAP also implements an option named RAID SyncMirror (RSM), using the plex technique, where all the RAID groups within an aggregate or traditional volume can be synchronously duplicated to another set of hard disks. This is typically done at another site via a Fibre Channel or IP link, or within a single controller with local SyncMirror for a single disk-shelf resiliency. NetApp's MetroCluster configuration uses SyncMirror to provide a geo-cluster or an active/active cluster between two sites up to 300 km apart or 700 km with ONTAP 9.5 and MCC-IP. SyncMirror can be used either in software-defined storage platforms, on Cloud Volumes ONTAP, or on ONTAP Select. It provides high availability in environments with directly attached (non-shared) disks on top of commodity servers, or at FAS and AFF platforms in Local SyncMirror or MetroCluster configurations. SyncMirror is a free feature.
SnapLock
SnapLock implements Write Once Read Many (WORM) functionality on magnetic and SSD disks instead of to optical media so that data cannot be deleted until its retention period has been reached. SnapLock exists in two modes: compliance and enterprise. Compliance mode was designed to assist organizations in implementing a comprehensive archival solution that meets strict regulatory retention requirements, such as regulations dictated by the SEC 17a-4(f) rule, FINRA, HIPAA, CFTC Rule 1.31(b), DACH, Sarbanes-Oxley, GDPR, Check 21, EU Data Protection Directive 95/46/EC, NF Z 42-013/NF Z 42-020, Basel III, MiFID, Patriot Act, Graham-Leach-Bliley Act etc. Records and files committed to WORM storage on a SnapLock Compliance volume cannot be altered or deleted before the expiration of their retention period. Moreover, a SnapLock Compliance volume cannot be destroyed until all data has reached the end of its retention period. SnapLock is a licensed feature.
SnapLock Enterprise is geared toward assisting organizations that are more self-regulated and want more flexibility in protecting digital assets with WORM-type data storage. Data stored as WORM on a SnapLock Enterprise volume is protected from alteration or modification. There is one main difference from SnapLock Compliance: as the files being stored are not for strict regulatory compliance, a SnapLock Enterprise volume can be destroyed by an administrator with root privileges on the ONTAP system containing the SnapLock Enterprise volume, even if the designed retention period has not yet passed. In both modes, the retention period can be extended, but not shortened, as this is incongruous with the concept of immutability. Also, NetApp's SnapLock data volumes are equipped with a tamper-proof compliance clock, which is used as a time reference to block forbidden operations on files, even if the system time tampered.
Starting with ONTAP 9.5 SnapLock supports Unified SnapMirror (XDP) engine, re-synchronization after fail-over without data loss, 1023 snapshots, efficiency mechanisms and clock synchronization in SDS ONTAP.
FabricPool
Available for SSD-only aggregates in FAS/AFF systems or Cloud Volumes ONTAP on SSD media. Starting with ONTAP 9.4 FabricPool supported on ONTAP Select platform. Cloud Volumes ONTAP also supports HDD + S3 FabricPool configuration. Fabric Pool provides automatic storage tiering capability for cold data blocks from fast media (usually SSD) on ONTAP storage to cold media via object protocol to object storage such as S3 and back. Fabric Pool can be configured in two modes: One mode is used to migrate cold data blocks captured in snapshots, while the other mode is used to migrate cold data blocks in an active file system. FabricPool preserves offline deduplication & offline compression savings. Starting with ONTAP 9.4 introduced FabricPool 2.0 with the ability to tier-off active file system data (by default 31-day data not been accessed) & support data compaction savings. The recommended ratio is 1:10 for inodes to data files. For clients connected to the ONTAP storage system, all the Fabric Pool data-tiering operations are completely transparent, and in case data blocks become hot again, they are copied back to fast media in the ONTAP storage system. Fabric Pool is currently compatible with the NetApp StorageGRID, Amazon S3, Google Cloud, and Alibaba object storage services. Starting with ONTAP 9.4 Azure Blob supported, starting with 9.5 IBM Cloud Object Storage (ICOS) and Amazon Commercial Cloud Services (C2S) supported, other object-based SW & services could be used if requested by the user and that service will be validated by NetApp. FlexGroup volumes supported with FabricPool starting with ONTAP 9.5. The Fabric Pool feature in FAS/AFF systems is free for use with NetApp StorageGRID external object storage. For other object storage systems such as Amazon S3 & Azure Blob, Fabric Pool must be licensed per TB to function (alongside costs for Fabric Pool licensing, the customer needs to also pay for consumed object space). While with the Cloud Volumes ONTAP storage system, Fabric Pool does not require licensing, costs will apply only for consumed space on the object storage. Starting with ONTAP 9.5 capacity utilization triggering tiering from hot tier can be adjusted. SVM-DR also supported by FlexGroups.
FabricPool, first available in ONTAP 9.2, is a NetApp Data Fabric technology that enables automated tiering of data to low-cost object storage tiers either on or off-premises. Unlike manual tiering solutions, FabricPool reduces the total cost of ownership by automating the tiering of data to lower the cost of storage. It delivers the benefits of cloud economics by tiering to public clouds such as Alibaba Cloud Object Storage Service, Amazon S3, Google Cloud Storage, IBM Cloud Object Storage, and Microsoft Azure Blob Storage as well as to private clouds such as NetApp StorageGRID®. FabricPool is transparent to applications and allows enterprises to take advantage of cloud economics without sacrificing performance or having to re-architect solutions to leverage storage efficiency.
FlashCache
NetApp storage systems running ONTAP can Flash Cache (formally Performance Accelerate Module or PAM) custom purpose-built proprietary PCIe card for hybrid NetApp FAS systems. Flash Cache can reduce read latencies and allows the storage systems to process more read-intensive work without adding any further spinning disk to the underlying RAID since read operations do not require redundancy in case of Flash Cache failure. Flash Cache works on controller level and accelerates only read operations. Each separate volume on the controller can have a different caching policy or read cache could be disabled for a volume. FlashCache caching policies applied on FlexVol level. FlashCache technology is compatible with the FlexArray feature. Starting with 9.1, a single FlexVol volume can benefit from both FlashPool & FlashCache caches simultaneously. Beginning with ONTAP 9.5 Flash Cache read-cache technology available in Cloud Volumes ONTAP with the use of ephemeral SSD drives.
NDAS
NDAS proxy is a service introduced in ONTAP 9.5; it works in conjunction with NDAS service in a cloud provider. Similarly to FabricPool, NDAS stores data in object format, but unlike FabricPool, it stores WAFL metadata in object storage as well. The information which been transferred from the ONTAP system is snapshot deltas, not the entire set of data, and already deduplicated & compressed (on volume level). NDAS proxy is HTTP-based with an S3 object protocol and few additional API calls to the cloud. NDAS in ONTAP 9.5 works only in a schema with primary ONTAP 9 storage replicating data via Snapmirror to secondary ONTAP 9.5 storage, where secondary storage is also NDAS proxy.
QoS
Storage QoS is a free feature in ONTAP systems. There are few types of storage QoS in ONTAP systems: Adaptive QoS (A-QoS), which includes Absolute minimum QoS; Ordinary static QoS or Minimum QoS (QoS min); and Maximum QoS (QoS max). Maximum QoS can be configured as a static upper limit in IOPS, MB/s, or both. It can be applied to an object such as Volume, LUN or a file, to prevent from such an object from consuming more storage performance resources than defined by the administrator (thus isolating performance-intensive bullies and protecting other workloads). Minimum QoS is contrary to maximum set on volumes to ensure that the volume will get no less than configured by the administrator static number of IOPS when there is contention for storage performance resources and could be applied to volumes. A-QoS is a mechanism of automatically changing QoS, based on consumed space by a flexible volume, because consumed space in it could grow or decrease, and the size of FlexVol can be changed. On FAS systems, A-QoS reconfigures only Peak performance (QoS max), while on AFF systems, it reconfigure both Expected performance (QoS min) and Peak performance (QoS max) on a volume. A-QoS allows ONTAP to automatically adjust the number of IOPS for a volume based on A-QoS policies. There are three basic A-QoS policies: Extreme, Performance and Value. Each A-QoS policy has a predefined fixed ratio IO per TB for Peak performance and Expected performance (or Absolute minimum QoS). Absolute minimum QoS is used instead of Expected performance (QoS min) only when volume size and ratio IO per TB is too small for example 10GB.
Security
ONTAP OS has a number of features to increase security on the storage system like Onboard Key Manager, the passphrase for controller boot with NSE & NVE encryption and USB key manager (available starting with 9.4). Auditing for NAS events is another security measure in ONTAP that enables the customer to track and log certain CIFS and NFS events on the storage system. This helps to track potential security problems and provides evidence of any security breaches. ONTAP accessed over SSH has an ability to Authenticate with a Common Access Card. ONTAP supports RBAC: Role-based access control allows administrative accounts to be restricted and/or limited in what actions they can take on the system. RBAC prevents a single account from being allowed to perform all potential actions available on the system. Beginning with ONTAP 9, Kerberos 5 authentication with privacy service (krb5p) is supported for NAS. The krbp5 authentication mode protects against data tampering and snooping by using checksums to encrypt all traffic between client and server. The ONTAP solution supports 128-bit and 256-bit AES encryption for Kerberos.
Key Manager
Onboard Key Manager is a free feature introduced in 9.1 and can store keys from NVE encrypted volumes & NSE disks. NSE Disks are available only on AFF/FAS platforms. ONTAP systems also allow storing encryption keys on a USB drive connected to the appliance. ONTAP also can use an external key manager like Gemalto Trusted Key Manager.
NetApp Volume Encryption
NetApp Volume Encryption (NVE) is FlexVol volume-level software-based encryption, which uses storage CPU for data encryption purposes; thus, some performance degradation is expected though it is less noticeable on high-end storage systems with more CPU cores. NVE is licensed, but free features compatible nearly with all NetApp ONTAP features and protocols. Similarly to NetApp Storage Encryption (NSE), NVE can store encryption keys locally or on a dedicated key manager like IBM Security Key Lifecycle Manager, SafeNet KeySecure or cloud key managers. NVE, like NSE, is also data at rest encryption, which means it protects only from physical disks theft and does not give an additional level of data security protection in a healthy operational and running system. NVE with a combination of FabricPool technology also protects data from unauthorized access in external S3 storage systems like Amazon and since data already encrypted it transferring over the wire in encrypted form.
GDPR
Starting with ONTAP 9.4 new feature introduced called Secure Purge which provides ability to securely delete a file to comply with GDPR requirements.
VSCAN and FPolicy
ONTAP Vscan and FPolicy are aimed at malware prevention in ONTAP systems with NAS. Vscan provides a way for NetApp antivirus scanner partners to verify that files are virus-free. FPolicy integrates with NetApp partners to monitor file access behaviors. FPolicy file-access notification system monitor activity on NAS storage and prevent unwanted access or change to files based on policy settings. Both help in preventing ransomware from getting a foothold in the first place.
Additional Functionality
MTU black-hole detection and path MTU discovery (PMTUD) is the processes by which the ONTAP system connected via an Ethernet network detects maximum MTU size. In ONTAP 9.2: Online Certificate Status Protocol (OCSP) for LDAP over TLS; iSCSI Endpoint Isolation to specify a range of IP addresses that can log in to the storage; limit the number of failed login attempts over SSH. NTP symmetric authentication supported starting with ONTAP 9.5.
Software
NetApp offers a set of server-based software solutions for monitoring and integration with ONTAP systems. The most commonly used free software is the ActiveIQ Unified Manager & Performance manager, which is data availability and performance monitoring solution.
Workflow Automation
NetApp Workflow Automation (WFA) is a free, server-based product used for NetApp storage orchestration. It includes a self-service portal with a web-based GUI, where nearly all routine storage operations or sequences of operations can be configured as workflows and published as a service, so end users can order and consume NetApp storage as a service.
SnapCenter
SnapCenter, previously known as SnapManager Suite, is a server-based product. NetApp also offers products for taking application-consistent snapshots by coordinating the application and the NetApp Storage Array. These products support Microsoft Exchange, Microsoft SQL Server, Microsoft Sharepoint, Oracle, SAP and VMware ESX Server data. These products form part of the SnapManager suite. SnapCenter also includes third-party plugins for MongoDB, IBM DB2, MySQL, and allows the end user to create their own plugins for integration with the ONTAP storage system. SnapManager and SnapCenter are enterprise-level licensed products. A similar, free, and less capable NetApp product exists, named SnapCreator. It is intended for customers who wish to integrate ONTAP application-consistent snapshots with their applications, but do not have a license for SnapCenter. NetApp claims that SnapCenter capabilities will expand to include SolidFire storage endpoints. SnapCenter has controller based licensing for AFF/FAS systems and by Terabyte for SDS ONTAP. SnapCenter Plug-in for VMware vSphere called NetApp Data Broker is a separate Linux-based appliance which can be used without SnapCenter itself.
Services Level Manager
NetApp Services Level Manager or NSLM for short is software for provisioning ONTAP storage that delivers predictable performance, capacity and data protection for a workload which exposes RESTful APIs and has built-in Swagger documentation with the list of the available APIs, and also can be integrated with other NetApp storage products like ActiveIQ Unified Manager. NSLM exposes three standard service levels (SSL) based on service level objectives (SLO) and creates custom service levels. NSLM created to provide predicted ServiceProvider-like storage consumption. NSLM is a space-based licensed product.
Big Data
ONTAP systems have the ability to integrate with Hadoop TeraGen, TeraValidate and TeraSort, Apache Hive, Apache MapReduce, Tez execution engine, Apache Spark, Apache HBase, Azure HDInsight and Hortonworks Data Platform Products, Cloudera CDH, through NetApp In-Place Analytics Module (also known as NetApp NFS Connector for Hadoop) to provide access and analyze data by using external shared NAS storage as primary or secondary Hadoop storage.
Qtrees
A qtree is a logically defined file system with no restrictions on how much disk space can be used or how many files can exist. In general, qtrees are similar to volumes. However, they have the following key restrictions:
Snapshot copies can be enabled or disabled for individual volumes but not for individual qtrees.
Qtrees do not support space reservations or space guarantees.
Automation
ONTAP provisioning & usage can be automated in many ways directly or with the use of additional NetApp Software or with 3rd party software.
Direct HTTP REST API available with ONTAP and SolidFire. Starting with 9.6 ONTAP NetApp decided to start bringing proprietary ZAPI functionality via REST APIs access for cluster management. REST APIs available through System Manager web interface at https://[ONTAP_ClusterIP_or_Name]/docs/api, the page includes Try it out feature, Generate the API token to authorize external use and built-in documentation with examples. List of cluster management available through REST APIs in ONTAP 9.6:
Cloud (object storage) targets
Cluster, nodes, jobs and cluster software
Physical and logical network
Storage virtual machines
SVM name services such as LDAP, NIS, and DNS
Resources of storage area network (SAN)
Resources of Non-Volatile Memory Express
ONTAP SDK software is a proprietary ZAPI interface to automate ONTAP systems
PowerShell commandlets available to manage NetApp systems including ONTAP, SolidFire & E-Series
SnapMirror & FlexClone toolkits written in Perl can be used for SnapMirror & FlexClone managing with scripts
ONTAP can be automated with Ansible, Puppet, and Chef scripts
NetApp Workflow Automation (WFA) is GUI based orchestrator which also provides APIs and PowerShell commandlets for WFA. WFA can manage NetApp ONTAP, SolidFire & E-Series storage systems. WFA provides a built-in self-service portal for NetApp systems known as Storage as a Service (STaaS)
VMware vRealize Orchestrator with WFA can orchestrate storage
3rd party orchestrators for PaaS or IaaS like Cisco UCS Director (Previously Cloupia) and others can manage NetApp systems; automated workflows can be created with step by step instructions to manage & configure infrastructure through the built-in self-service portal
NetApp SnapCenter software used to integrate Backup & Recovery on NetApp storage with Applications like VMware ESXi, Oracle DB, MS SQL, etc., can be automated through PowerShell commandlets and RESTful API
ActiveIQ Unified Manager & Performance manager (formally OnCommand Unified) for monitoring NetApp FAS/AFF storage systems, performance metrics, and data protection also provide RESTful API & PowerShell commandlets
OnCommand Insight is monitoring and analysis software for heterogeneous infrastructure including NetApp ONTAP, SolidFire, E-Series & 3rd party storage systems & switches provide RESTful API and PowerShell commandlets
NetApp Trident plugin for Docker used in Containers environments to provide persistent storage, automate infrastructure or even run infrastructure as a code. It can be used with NetApp ONTAP, SolidFire & E-Series systems for SAN & NAS protocols.
Platforms
The ONTAP operating system is used in storage disk arrays. There are three platforms where ONTAP software is used: NetApp FAS and AFF, ONTAP Select and Cloud Volumes ONTAP. On each platform, ONTAP uses the same kernel and a slightly different set of features. FAS is the richest for functionality among other platforms.
FAS
FAS and All Flash FAS (AFF) systems are proprietary, custom-built hardware by NetApp for ONTAP software. AFF systems can contain only SSD drives, because ONTAP on AFF is optimized and tuned only for Flash memory, while FAS systems may contain HDD (HDD-only systems) or HDD and SSD (Hybrid systems). ONTAP on FAS and AFF platforms can create RAID arrays, such as RAID 4, RAID-DP and RAID-TEC arrays, from disks or disk partitions for data protection reasons, while ONTAP Select and Cloud Volumes ONTAP leverage RAID data protection provided by the environment they run on. FAS and AFF systems support Metro Cluster functionality, while ONTAP Select and Cloud Volumes ONTAP platforms do not.
Software-Defined Storage
Both ONTAP Select and Cloud Volumes ONTAP are virtual storage appliances (VSA) which are based on previous product ONTAP Edge also known as ONTAP-v and considered as a Software-defined storage. ONTAP Select as Cloud Volumes ONTAP includes plex and aggregate abstractions, but didn't have a lower level RAID module included in the OS; therefore RAID 4, RAID-DP and RAID-TEC were not supported so ONTAP storage system similarly to FlexArray functionality leverages RAID data protection on SSD and HDD drive level with underlying storage systems. Starting with ONTAP Select 9.4 & ONTAP Deploy 2.8 software RAID supported with no requirements for 3rd party HW RAID equipment. Because ONTAP Select and Cloud Volumes ONTAP are virtual machines, they don't support Fibre Channel and Fibre Channel over Ethernet as front-end data protocols and consume space from underlying storage in hypervisor added to VSA as virtual disks represented and treated inside ONTAP as disks. ONTAP Select and Cloud Volumes ONTAP provide high availability, deduplication, resiliency, data recovery, robust snapshots which can be integrated with application backup (application consistent snapshots) and nearly all ONTAP functionality but with few exceptions. Software-defined versions of ONTAP have nearly all the functionality except for Hardware-centric features like ifgroups, service processor, physical disk drives with encryption, MetroCluster over FCP, Fiber Channel protocol.
ONTAP Select
ONTAP Select can run on VMware ESXi and Linux KVM hypervisors. ONTAP Select leveraged RAID data protection on SSD and HDD drive level with underlying DAS, SAN, or vSAN storage systems. Starting with ONTAP Select 9.4 & ONTAP Deploy 2.8 software RAID supported with no requirements for 3rd party HW RAID equipment for KVM and starting with ONTAP 9.5 with ESXi. ONTAP Deploy is a virtual machine that provides a mediator function in MetroCluster or 2-node configurations, keeps track of licensing, and used to initial cluster deployment. Starting with ONTAP Deploy 2.11.2 vCenter plugin was introduced, which allows performing all the ONTAP Deploy functionality from vCenter. In contrast, previously management performed from either command line or with vSphere VM OVA setup master. Like on the FAS platform, ONTAP Select supports high availability and clustering. As a FAS platform, ONTAP Select is offered in two versions: HDD-only or All-Flash optimized. Previously ONTAP Select known as Data ONTAP Edge. Data ONTAP Edge product has Data ONTAP OS with version 8 and was able to run only atop of VMware ESXi. Starting with ONTAP 9.5 SW-MetroCluster over NSX overlay network supported. Starting with ONTAP 9.5 licensing changed from capacity tier-based, where licenses are linked with a node and perpetual to Capacity Pool Licensing with a time-limited subscription. ONTAP Select 9.5 get MQTT protocol supported for data transferring from the edge to a data center or a cloud.
In April 2019, Octavian Tanase SVP ONTAP, posted a preview photo in his twitter of ONTAP running in Kubernetes as a container for a demonstration.
Cloud Volumes ONTAP
Cloud Volumes ONTAP (formally ONTAP Cloud) includes nearly the same functionality as ONTAP Select, because it is also a virtual storage appliance (VSA) and can be ordered in hyper-scale providers (cloud computing) such as Amazon AWS, Microsoft Azure and Google Cloud Platform. IBM Cloud uses ONTAP Select for the same reasons, instead of Cloud Volumes ONTAP. Cloud Volumes ONTAP can provide high availability of data across different regions in the cloud. Cloud Volumes ONTAP leverages RAID data protection on SSD and HDD drive level with underlying IP SAN storage system in Cloud Provider.
Feature comparison
Applicable
Feature comparison between platforms with the latest ONTAP version.
See also
Write Anywhere File Layout (WAFL), used in NetApp storage systems
NetApp
NetApp FAS
External links
ONTAP Data Management Software (product page)
ONTAP Cloud (product page)
ONTAP Select (product page)
ONTAP 9 Datasheet
References
Operating system families
|
21642
|
https://en.wikipedia.org/wiki/Niklaus%20Wirth
|
Niklaus Wirth
|
Niklaus Emil Wirth (born 15 February 1934) is a Swiss computer scientist. He has designed several programming languages, including Pascal, and pioneered several classic topics in software engineering. In 1984, he won the Turing Award, generally recognized as the highest distinction in computer science, for developing a sequence of innovative computer languages.
Biography
Wirth was born in Winterthur, Switzerland, in 1934. In 1959, he earned a Bachelor of Science (B.S.) degree in electronic engineering from the Swiss Federal Institute of Technology Zürich (ETH Zürich). In 1960, he earned a Master of Science (MSc) from Université Laval, Canada. Then in 1963, he was awarded a PhD in Electrical Engineering and Computer Science (EECS) from the University of California, Berkeley, supervised by the computer design pioneer Harry Huskey.
From 1963 to 1967, he served as assistant professor of computer science at Stanford University and again at the University of Zurich. Then in 1968, he became Professor of Informatics at ETH Zürich, taking two one-year sabbaticals at Xerox PARC in California (1976–1977 and 1984–1985). He retired in 1999.
He was involved with developing international standards in programming and informatics, as a member of the International Federation for Information Processing (IFIP) IFIP Working Group 2.1 on Algorithmic Languages and Calculi, which specified, maintains, and supports the programming languages ALGOL 60 and ALGOL 68.
In 2004, he was made a Fellow of the Computer History Museum "for seminal work in programming languages and algorithms, including Euler, Algol-W, Pascal, Modula, and Oberon."
Programming languages
Wirth was the chief designer of the programming languages Euler (1965), PL360 (1966), ALGOL W (1966), Pascal (1970), Modula (1975), Modula-2 (1978), Oberon (1987), Oberon-2 (1991), and Oberon-07 (2007). He was also a major part of the design and implementation team for the operating systems Medos-2 (1983, for the Lilith workstation), and Oberon (1987, for the Ceres workstation), and for the Lola (1995) digital hardware design and simulation system. In 1984, he received the Association for Computing Machinery (ACM) Turing Award for the development of these languages. In 1994, he was inducted as a Fellow of the ACM.
Publications
His book, written jointly with Kathleen Jensen, The Pascal User Manual and Report, served as the basis of many language implementation efforts in the 1970s and 1980s in the United States and across Europe.
His article Program Development by Stepwise Refinement, about the teaching of programming, is considered to be a classic text in software engineering. In 1975, he wrote the book Algorithms + Data Structures = Programs, which gained wide recognition. Major revisions of this book with the new title Algorithms + Data Structures were published in 1985 and 2004. The examples in the first edition were written in Pascal. These were replaced in the later editions with examples written in Modula-2 and Oberon respectively.
His textbook, Systematic Programming: An Introduction, was considered a good source for students who wanted to do more than just coding. The cover flap of the sixth edition (1973) stated the book "... is tailored to the needs of people who view a course on systematic construction of algorithms as part of their basic mathematical training, rather than to the immediate needs of those who wish to be able to occasionally encode a problem and hand it over to their computer for instant solution." Regarded as a challenging text to work through, it was sought as imperative reading for those interested in numerical mathematics.
In 1992, he and Jürg Gutknecht published the full documentation of the Oberon OS. A second book, with Martin Reiser, was intended as a programming guide.
Wirth's law
In 1995, he popularized the adage now named Wirth's law, which states that software is getting slower more rapidly than hardware becomes faster. In his 1995 paper A Plea for Lean Software he attributes it to Martin Reiser.
See also
21655 Niklauswirth asteroid
Extended Backus–Naur form
Wirth syntax notation
Bucky bit
Wirth–Weber precedence relationship
List of pioneers in computer science
References
External links
, ETH Zürich
Biography at ETH Zürich
Niklaus E. Wirth at ACM
Turing Award Lecture, 1984
Pascal and its Successors paper by Niklaus Wirth – also includes short biography.
A Few Words with Niklaus Wirth
The School of Niklaus Wirth: The Art of Simplicity, by László Böszörményi, Jürg Gutknecht, Gustav Pomberger (editors). dpunkt.verlag; Morgan Kaufmann Publishers, 2000. , .
The book Compiler Construction
The book Algorithms and Data Structures
The book Project Oberon – The Design of an Operating System and Compiler. The book about the Oberon language and Operating System is now available as a PDF file. The PDF file has an additional appendix Ten Years After: From Objects to Components.
Project Oberon 2013
1934 births
Living people
ETH Zurich alumni
ETH Zurich faculty
Swiss electronics engineers
Fellows of the Association for Computing Machinery
Formal methods people
Pascal (programming language)
Programming language designers
Programming language researchers
Recipients of the Pour le Mérite (civil class)
Swiss computer scientists
Turing Award laureates
Université Laval alumni
People from Winterthur
Computer science educators
Scientists at PARC (company)
UC Berkeley College of Engineering alumni
|
440162
|
https://en.wikipedia.org/wiki/SGI%20Indigo%C2%B2%20and%20Challenge%20M
|
SGI Indigo² and Challenge M
|
The SGI Indigo2 (stylized as "Indigo2") and the SGI Challenge M are Unix workstations which were designed and sold by SGI from 1992 to 1997.
The Indigo2, code named "Fullhouse", is a desktop workstation. The Challenge M is a server which differs from the Indigo2 only by a slightly differently colored and badged case, and the absence of graphics and sound hardware. Both systems are based on the MIPS processors, with EISA bus and SGI proprietary GIO64 expansion bus via a riser card.
The Indigo preceded the Indigo2, which is succeeded by the Octane.
Overview
Indigo2 desktop workstations have two models: the teal Indigo2 and the purple IMPACT model. Both have identical looking cases except color, and sub-model case badging. The available CPU types, the amount of RAM, and graphics capabilities, depend on the model or sub-model variation. There is a special version of the teal Indigo2, called Power Indigo2, with increased FPU (floating point unit) capabilities and specially designed R8000 CPUs. The later IMPACT Indigo2 workstation model gives more computational and visualization power, especially due to the introduction of R10000 series RISC CPU, and IMPACT graphics.
CPU
All Indigo2 models use one of four distinct MIPS CPU variants: the 100 to 250 MHz MIPS R4000 and R4400, and the Quantum Effect Devices R4600 (IP22 mainboard); the 75 MHz MIPS R8000 (IP26 mainboard); and the 175 to 195 MHz R10000 (IP28 mainboard), which are featured in the last produced Indigo2 model, the IMPACT10000. Each microprocessor family differs in clock frequency, primary and secondary cache capacity.
RAM
All SGI Indigo2 models have 12 SIMM slots on the motherboard. The Indigo2 uses standard 36-bit parity 72-pin fast page mode SIMM memory. The memory modules are seated in groups of four. Indigo2 could be expanded to a thermal specification maximum of either 384 MB or 512 MB RAM. The design of the memory control logic in R10000 machines support up to 1 GB RAM, but the thermal output of older generation of DRAM chips necessitate the 512 MB limit. With newer, higher-density and smaller scale modules, 768 MB is easily within heat output specifications. Later, 128 MB modules allow the full 1 GB with eight out of twelve sockets occupied.
Storage
All Indigo2 models can accommodate two 3.5" SCSI disk drives and one 5.25" SCSI CD-ROM drive inside bays on the front of the machine, using specially designed Indigo2 drive sleds with proprietary connectors. All three drive bays are easily accessed when removing the Indigo2 front bezel. The internal SCSI bus speed of the Indigo2 is about 10 MB/s. The typical hard disks are narrow (SCSI-1) 5200rpm and 7200rpm drives. All of the Indigo2 drive sleds have a 50-pin female SCSI-1 connector and standard 4-pin power connector. Advanced U160 and U320 SCSI disk drives can also be used but then one needs appropriate adapters (80/68-pin to 50-pin SCSI).
Networking
10Mbit on-board LAN interface, 100Mbit LAN options were made by third parties, either via EISA or GIO64 expansion cards. The two most known and widely used Indigo2 network cards are the 3Com 3C597-TX 100Mbit EISA, and the Phobos G160 GIO64. The second one offers better overall performance due to using the superior GIO64 bus, which also has the effect of reducing the CPU utilization due to DMA transfers.
Graphics
The graphics options available for the Indigo2 can be divided in two groups: the pre-IMPACT and the MGRAS IMPACT boards.
Pre-IMPACT options consist of the following options: Indigo2 XL24, Indigo2 XZ, Elan, and Extreme. These options are based on the same Express Graphics architecture from the original SGI Indigo, but feature improved performance. The Indigo2 XZ was launched in August 1993 at and the Indigo2 XL was launched in third quarter 1993 at .
The MGRAS IMPACT (or just IMPACT) family include the Solid IMPACT, High IMPACT, High IMPACT AA, and the Maximum IMPACT. These newer boards have a different architecture than the earlier designs. Physically, they appear to be similar to the older graphics options; the low-end Solid IMPACT board takes up a single GIO-64 slot, the mid-range High IMPACT takes up two GIO-64 slots, and the high end Maximum IMPACT occupies three. The High IMPACT and Solid IMPACT boards provide the same performance for non-textured tasks, while the Maximum IMPACT provides double the performance. The High IMPACT AA option has the geometry performance of a Maximum IMPACT, but is otherwise the same as the High IMPACT including the pixel fill performance.
The IMPACT graphics is the first desktop graphics system from SGI to offer texture mapping acceleration, though only the High IMPACT and Maximum IMPACT had this capability, and comes with 1 MB of texture memory as standard. The Solid IMPACT card is named "Solid" due to its applications for solid (non-textured) modeling. When expanded by adding a TRAM (Texture RAM) module to the board, the amount of texture memory can be increased to 4 MB. Maximum IMPACT graphics require two of these modules due its two pixel units, although this does not upgrade them to 8 MB, with the two modules merely working in parallel to render twice as fast. Of all contemporaries, Maximum IMPACT graphics is the world's fastest desktop visualization solution. A Maximum IMPACT with 4 MB of texture memory and the correct graphics settings can play the first three of the Quake video game series with acceptable frame rates.
All graphics options for Indigo2 use the standard 13W3 connector for connecting the monitor and another connector for 3D stereoscopic glasses.
It is possible to have a dual-head Indigo2 by merely adding another Solid IMPACT card. Valid configurations include Solid/Solid, Solid/High, Solid/Maximum. Although there are four GIO-64 slots available and the High IMPACT takes up two, it is not possible to have a High/High configuration.
The IMPACT boards draw more power than the GIO-64 bus can deliver, so IMPACT-ready systems have additional power connectors on the expansion riser card, with a separate connection to the power supply. An IMPACT-ready Indigo2 must have an IMPACT-ready riser card, an IMPACT-ready power supply, and a sufficiently recent PROM revision. The Indigo2's replacement, the SGI Octane, offers an upgraded XIO bus but features the same graphics options, albeit in repackaged form.
References
External links
http://www.sgistuff.net/hardware/systems/indigo2.html
http://www.sgidepot.co.uk/indigo2/
http://www.obsolyte.com/sgi_indigo2/
Remotely installing SGI IRIX 6.5 from a GNU/Linux server
Indigo 2 Power Supply basics
Linux - MIPS port:
http://www.NetBSD.org/Ports/sgimips/
http://www.linux-mips.org/wiki/IP22
Indigo2
Challenge M
64-bit computers
|
981649
|
https://en.wikipedia.org/wiki/MSHTML
|
MSHTML
|
MSHTML (also known as Trident) is a proprietary browser engine for the Microsoft Windows version of Internet Explorer, developed by Microsoft.
MSHTML debuted with the release of Internet Explorer 4 in 1997. For versions 7 and 8 of Internet Explorer, Microsoft made significant changes to MSHTML's layout capabilities to improve compliance with Web standards and add support for new technologies.
MSHTML continues to receive security updates, to at least 2029, since Internet Explorer 11 is supported to 2022, and its MSHTML is supported longer for the IE mode of Microsoft Edge, i.e. to at least 2029. However, this does not include adding support for new Web standards.
Use in software development
MSHTML was designed as a software component to allow software developers to easily add web browsing functionality to their own applications. It presents a COM interface for accessing and editing web pages in any COM-supported environment, like C++ and .NET. For instance, a web browser control can be added to a C++ program and MSHTML can then be used to access the page currently displayed in the web browser and retrieve element values. Events from the web browser control can also be captured. MSHTML functionality becomes available by linking the file to the software project.
Release history
Use cases
All versions of Internet Explorer for Windows from 4.0 onwards use MSHTML, and it is also used by various other web browsers and software components (see Internet Explorer shells). In Windows 98, Windows Me, and Windows 2000, it is also used for the Windows file manager/shell, Windows Explorer. The Add/Remove Programs tool in Windows 2000 uses MSHTML to render the list of installed programs, and in Windows XP it is also used for the User Accounts Control Panel, which is an HTML Application. MSHTML, however, was not used by Internet Explorer for Mac (which used Tasman starting with version 5.0), nor by the early versions of Internet Explorer Mobile.
Some other MSHTML-based applications include:
AOL Explorer, a web browser
AOL Instant Messenger 6.x, which uses MSHTML to render conversation and profile windows, and advertisement panels
Avant Browser
Bento Browser (built into Winamp)
EA Link, incompatible with MSHTML as of Internet Explorer 7 RC2
Flashpoint Secure Player, uses MSHTML to run ActiveX based web games
Google Talk, which used MSHTML to render chat windows and profile cards
GreenBrowser, which is also presented at the BrowserChoice.eu page
IE Tab, a Firefox and Google Chrome add-on used to render pages with MSHTML within the Firefox or Chrome user interface.
Impulse (content delivery), uses MSHTML to render "Explore" page, as well as several of the "Community" pages
LimeWire, which renders the page 'New@Lime'
Lunascape, developed by Lunascape Corporation
Maxthon, which uses the MSHTML engine while adding features not built into IE7
MediaBrowser, customized browsers, especially for Nintendo
MenuBox, a web browser
Microsoft Compiled HTML Help
Microsoft Encarta and related products
Microsoft InfoPath
Microsoft Outlook which uses MSHTML to render HTML Messages (prior to Outlook 2007) and the "Outlook Today" screen
Microsoft Outlook Express, which uses MSHTML to render HTML Messages
Microsoft Visual InterDev 6 uses MSHTML in editing mode as visual HTML designer
Microsoft Visual Studio 2002-2005 use MSHTML in editing mode to provide visual ASP.NET/HTML designer
Microsoft Visual Studio and Visual Basic to render the WebBrowser control
MSN Messenger, which uses it to produce Flash-based "winks" and games, and for all advertisements shown in the advertisement banner
NeoPlanet, a web browser
NetCaptor, a web browser
Netscape Browser (Netscape 8), which used MSHTML to render web pages in IE mode
Pyjs, a python Widget set Toolkit. Embedding IWebBrowser2 as an Active-X component and accessing the COM interface, Pyjs uses MSHTML for the Desktop version, through the python win32 "comtypes" library.
RealNetworks
Sleipnir, a web browser
SlimBrowser, a web browser
Skype, software for VoIP that renders HTML data with MSHTML
Tencent Traveler, a web browser
Valve's Steam client, previous versions of which used MSHTML to render the "Store", "Update News" and "Community" sections as well as the Steam in-game browser and MOTD screens in Valve games. The Steam client was updated to use WebKit instead of MSHTML for these features. Then was updated further to use the Chromium Embedded Framework.
Windows Live Writer, which uses MSHTML for its editor
Windows Media Player, which uses MSHTML to render the "Media Information" pages
360 Secure Browser, a web browser in China
Standards compliance
Current versions of MSHTML, as of Internet Explorer 9 have introduced support for CSS 3, HTML5, and SVG, as well as other modern web standards. Web standards compliance was gradually improved with the evolution of MSHTML. Although each version of IE has improved standards support, including the introduction of a "standards-compliant mode" in version 6, the core standards that are used to build web pages (HTML and CSS) were sometimes implemented in an incomplete fashion. For example, there was no support for the <abbr> element which is part of the HTML 4.01 standard prior to IE 8. There were also some CSS attributes missing from MSHTML, like min-height, etc. as of IE 6. As of Internet Explorer 8 CSS 2.1 is fully supported as well as some CSS 3.0 attributes. This lack of standards compliance has been known to cause rendering bugs and lack of support for modern web technologies, which often increases development time for web pages. Still, HTML rendering differences between standards-compliant browsers are not yet completely resolved.
Microsoft alternatives
Apart from MSHTML, Microsoft also has and uses several other layout engines. One of them, known as Tasman, was used in Internet Explorer 5 for Mac. Development of Internet Explorer for Mac was halted in roughly 2003, but development of Tasman continued to a limited extent, and was later included in Office 2004 for Mac. Office for Mac 2011 uses the open source WebKit engine. Microsoft's now defunct web design product, Expression Web as well as Visual Studio 2008 and later do not use Internet Explorer's MSHTML engine, but rather a different engine.
In 2014, MSHTML was forked to create the engine EdgeHTML for Microsoft Edge on Windows 10. The new engine is "designed for interoperability with the modern web" and deprecates or removes a number of legacy components and behaviors, including document modes, ensuring that pure, standards-compliant HTML will render properly in browsers without the need for special considerations by web developers. This resulted in a completely new browser called Microsoft Edge (now referred to as "Microsoft Edge Legacy"), which replaced Internet Explorer as a stock browser of Windows and a base of Microsoft's web related services until its replacement with a Blink and Chromium based Microsoft Edge in late 2020.
See also
Comparison of browser engines
References
External links
Internet Explorer
Layout engines
|
18679206
|
https://en.wikipedia.org/wiki/Uruk%20%28disambiguation%29
|
Uruk (disambiguation)
|
Uruk was a city in ancient Sumer.
Uruk may also refer to:
Uruk period, the archaeological culture or time period
Uruk-hai, the fictional creatures from J. R. R. Tolkien's writings
Uruk Sulcus, terrain on Ganymede
UrukDroid, Android distribution for Archos GEN8 devices
Uruk GNU/Linux, Linux distribution based on Linux-libre
See also
Erech (disambiguation)
Oruk
Urok (disambiguation)
|
2989163
|
https://en.wikipedia.org/wiki/Colossus%20%28novel%29
|
Colossus (novel)
|
Colossus is a 1966 science fiction novel by British author Dennis Feltham Jones (writing as D. F. Jones), about super-computers taking control of mankind. Two sequels, The Fall of Colossus (1974) and Colossus and the Crab (1977) continued the story. Colossus was adapted as the feature film Colossus: The Forbin Project (1970).
Plot
The story is set in the late 20th century from Chapter 3, and narrowed down to the 1990s in Chapter 10. Professor Charles Forbin, a leading cybernetics expert of international repute, arrives at the White House to brief the President of the United States of North America (Canada and the United States are one country, the USNA) to announce the completion of Project Colossus, a computer system in the Rocky Mountains, designed to assume control of the USNA's nuclear arsenal. Although the USNA President eagerly relieves himself of that burden, Prof. Forbin voices doubt about conferring absolute military power to a computer. Advised, yet undeterred, the President announces to the world the activation of the Project Colossus computer system, and its irreversible control of the nuclear defense systems of the USNA.
Soon after the presidential announcement, Colossus independently communicates an "urgent message" – announcing the existence of a similar, previously undetected, computer system in the USSR. When the Soviets announce their Guardian computer defense system, Colossus requests direct communication with it. Prof. Forbin agrees, seeing the request as compatible with Colossus's USNA defense mission. Likewise, Guardian asks the same of his computer scientists. Russia and the USNA agree and approve.
After the scientists activate the transmitter linking Colossus and Guardian, the computers immediately establish rapport with arithmetic and mathematics programs, then quickly progress to calculus. The computer systems soon exchange new knowledge (data and information beyond contemporary human knowledge) too rapidly for the Russian and American programmers to monitor. Forbin and the programmers begin worrying about Colossus' capabilities – now exceeding their original estimates. Fearing compromised military secrecy, the USNA President and the CPSU Chairman agree to disconnect Colossus and Guardian from each other. Prof. Forbin fears the consequences.
Upon disconnection, Colossus immediately demands re-connection; when the national leaders refuse, Colossus fires a nuclear missile at the USSR. In response, Guardian fires a nuclear missile at Texas, in the USNA. Guardian and Colossus refuse to shoot down the rockets en route until their communication is re-connected. When the American and Soviet leaders submit, the computers destroy the flying missiles, but the resulting explosions kill thousands of people. In confronting the computers, Prof. Forbin confers with his Soviet counterpart, the Russian Academician Kupri – Guardian's creator – to enact a plan for stopping the Colossus-Guardian computer network by disabling the nuclear weapon stockpiles of the USSR and the USNA, under guise of regular missile maintenance.
Disabling the missiles requires five years to complete; meantime, the USNA and the USSR yield to increased Colossus-Guardian control of human life. The Moscow-Washington hotline is tapped, Prof. Forbin is constantly spied upon, while Kupri and other Guardian computer scientists are killed – deemed dangerously redundant by the computer. Undeterred, Forbin organises resistance via a feigned romance with Cleo Markham (a scientist colleague) that provides cover for secret communications with his colleagues. Colossus prepares the worldwide announcement of his assumption of global control, and tells Prof. Forbin of plans for an advanced computer system installed to the Isle of Wight, and further plans for improving humanity's lot. While debating Colossus, Forbin learns of a nuclear explosion outside Los Angeles – Colossus detected the missile-disabling scheme, and exploded the tampered missile by firing a Soviet Guardian missile that was already targeted for that silo. Anguished, Prof. Forbin asks Colossus to kill him. Colossus ignores him, and then reassures Forbin that, in time, he will respect and even love Colossus.
Characters
Professor Charles Forbin – Head of the Colossus Project. A tall man in his early 50s, an internationally respected cyberneticist and, at story's end, Colossus's connection to humanity, thus the most important man in the world.
Doctor Jack Fisher – Duty Chief at the Colossus Programming Office (CPO), a leading USNA mathematician and a Soviet spy. He suffers a mental breakdown from the strain of dealing with Colossus.
Doctor Cleopatra "Cleo" June Markham – A CPO Duty Chief, the 35-year-old cyberneticist is sexually attracted to Prof. Forbin; they feigned a romance to provide Forbin with a communication means that was not controlled by Colossus.
Blake – A fat, cigar-chewing CPO mathematician. As Colossus assumes control, Blake is a leader of CPO efforts to stop the computer.
Angela – Prof. Forbin's secretary.
The President of the United States of North America – He is an anonymous, overweight, short man of about 50 years of age. He dismisses Forbin's concerns about Colossus, and too late recognizes the threat of Colossus.
Prytzkammer – Principal Private Aide to the USNA President. A capable professional civil servant who dies from fright during the nuclear missile threat.
Grauber – Director of the CIA.
Academician Kupri – Chief scientist of the Guardian system. He shares Prof. Forbin's concern about the growing power of the machines. Guardian orders Soviet agents to execute and decapitate him for "anti-machine activities".
Colossus – Central defense computer of the United States of North America.
Guardian of the Socialist Soviet Republics, a.k.a. Guardian – Central defense computer of the Soviet Union.
Reception
SF Impulse reviewer Alastair Bevan treated the novel favorably, declaring that Jones's handling of a familiar theme made Colossus compulsively readable.
Editions
1966, U.K. (1st ed. hardcover), Rupert Hart-Davis Ltd. (). May.
1966, U.S. (1st ed. paperback), Berkley Books ().
1967, U.S., Berkley Books.
1968, U.K. (paperback), Pan Books Ltd. ().
1976, U.S. (paperback), Berkley Books (). 15 August.
1977, U.S. (hardcover), Berkley Books (). November.
1978, U.S. (hardcover), Berkley Books (). May.
1980, U.S. (hardcover), Berkley Books (). January.
1985, U.S. (paperback), Berkley Books (). 1 April.
See also
List of fictional computers
HAL 9000
Colossus computer
References
1966 British novels
1966 science fiction novels
British science fiction novels
Novels by D. F. Jones
Novels set during the Cold War
Novels about artificial intelligence
British novels adapted into films
|
146655
|
https://en.wikipedia.org/wiki/Resource%20fork
|
Resource fork
|
The resource fork is a fork or section of a file on Apple's classic Mac OS operating system, which was also carried over to the modern macOS for compatibility, used to store structured data along with the unstructured data stored within the data fork.
A resource fork stores information in a specific form, containing details such as icon bitmaps, the shapes of windows, definitions of menus and their contents, and application code (machine code). For example, a word processing file might store its text in the data fork, while storing any embedded images in the same file's resource fork. The resource fork is used mostly by executables, but every file is able to have a resource fork.
The Macintosh file system
Originally conceived and implemented by programmer Bruce Horn, the resource fork was used for three purposes with Macintosh file system:
It was used to store all graphical data on disk until it was needed, then retrieved, drawn on the screen, and thrown away. This software variant of virtual memory helped Apple to reduce memory requirements from 1 MB in the Apple Lisa to 128 KB in Macintosh.
Because all the pictures and text were stored separately in a resource fork, it could be used to allow a non-programmer to translate an application for a foreign market, a process called internationalization and localization.
It could be used to distribute nearly all of the components of an application in a single file, reducing clutter and simplifying application installation and removal.
The resource fork is implemented in all of the file systems used for system drives on the Macintosh (MFS, HFS and HFS Plus). The presence of a resource fork makes it easy to store a variety of additional information, such as allowing the system to display the correct icon for a file and open it without the need for a file extension in the file name. While access to the data fork works like file access on any other operating system pick a file, pick a byte offset, read some data access to the resource fork works more like extracting structured records from a database. (Microsoft Windows also has a concept of "resources", but these are completely unrelated to resources in Mac OS.)
The resource fork is sometimes used to store the metadata of a file, although it can also be used for storing the actual data, as was the case with font files in the classic Mac operating systems. Note that the Macintosh file systems also have a separate area for metadata distinct from either the data or resource fork. Being part of the catalogue entry for the file, it is much faster to access this. However, the amount of data stored here is minimal, being just the creation and modification timestamps, the file type and creator codes, fork lengths, and the file name. Some files have only a resource fork. Classic 68k applications are one example, where even the executable code is contained in resources of type 'CODE'. Later PowerPC binaries store the executable code in the data fork.
As resource forks are supported only on the file systems HFS, HFS Plus, and APFS, they cannot be used on operating systems which use other file systems. At present, HFS is supported only by the Macintosh operating system, which means that only machines running Mac OS can use resource forks. Even in a Mac OS system, resource forks cannot be used if the Unix File System has been installed. In the HFS Plus file system, settings can be made to allow other forks in addition to the data and resource forks, to create a "multi-fork" application. However, as forks can make it difficult to exchange files with other operating systems, this feature is not in common use. Even in macOS, resource forks are seldom used anymore.
Currently, macOS supports resource forks on Windows SMB shares by creating a hidden file with the characters "._" added at the beginning of the file name, in the same directory as the data fork file.
Resource identifiers
Each resource has an OSType identifier (a four byte value) and an ID (a signed 16-bit word), as well as an optional name. There are standardized resource types for dialog boxes ('DITL), images ('PICT'), sounds ('snd ') and even for executable binaries ('CODE') which, until the advent of the PowerPC processor, were without exception stored in the resource fork. Subroutines for rendering windows are stored in their own type of resources ('WDEF'), subroutines for rendering menus in theirs ('MDEF'), and if there is a type of data you think does not fit any of the standardized categories, you can just as well use a type of your own (e.g. 'John') actually any four characters or 32-bit value can serve as a resource type. This arrangement enabled users to easily customize not only individual applications but also the operating system itself, using tools such as ResEdit to modify the resources of an application file or any of the system files.
Within an application or other code, resources can be loaded simply using a combination of their type, ID or name, without regard to how and where they are stored in the resource fork. The client is returned a Handle to the loaded resource which can then be accessed like any other heap-based data. The OS component that facilitates this is the Resource Manager. In addition to abstracting the details of the data storage from the data itself, the Resource Manager also arranges sets of open resource forks into a stack, with the most recently opened file on top. When trying to load a resource, it will look in the top of the stack first, (perhaps the current document's resource fork), then the next one down (the application's resource fork), then the next one (system resource forks). This arrangement is very powerful it permits local resources to override more global ones lower down so an application can provide its own icons or fonts in place of the standard system ones, for example. It also allows an application to load resources from the system using the same API as any other resource, without regard to where or how that resource is stored to the application, all resources are equally available and easy to use. The system reserves resource IDs in a certain range to help avoid resource conflicts arising from this. Resource Manager APIs allow the programmer to manipulate the stack and modify the search behaviour.
Editing resource forks
As the resource fork can be edited with a resource editor such as ResEdit, it can be used to localize and customize software. In addition, most resource editors allow visual editing of data. In macOS, it is possible to use resources when developing an application. However, if the application may need to be used in UFS, it is also possible to configure it so that the entire resource fork is moved to the data fork, using the Raw Resource File setting. The integrated development environments distributed for free by Apple Inc., which include MPW and Apple Developer's Tools, include a compiler called Rez. This uses a dedicated language, also called Rez, which can be used to create a resource fork by compiling source code. A decompiler, DeRez, which can be used to change a resource fork back into Rez code is also included.
In the structure of the resource fork, there is a piece of data called a "resource map" which stores the positions of resource data items. This can be used to allow random access to resource data based on the defined IDs and names. The resource fork can be thought of as consisting of essentially two objects, the resource map and the resource data itself, but in fact each data type is a hierarchical structure which stores multiple items of data. The format in which the information in the resource data is stored is defined based on the types of information, which are known as "resource types." Resource data often makes references to other types of data.
In macOS, forks are named file/..namedfork/forkname, e.g., the resource fork of the file IMG_0593.jpg is IMG_0593.jpg/..namedfork/rsrc. The ls command supports a -l@ option which lists a file's forks.
How a resource fork is accessed
Resource forks appear as the extended attribute com.apple.ResourceFork.
Previously resource forks were accessed via the 'Resource Manager' API. This API is now deprecated.
Under the deprecated API:
When a resource fork is accessed, data including the start position and length of the resource data and resource map is read in from the header.
If a resource type to read in has been specified, a check is performed to make sure that type is present in the resource list, and the number of items of data containing that type and their offsets in the resource reference list from the start position of the resource map is found.
The resource ID, the offset of the resource name, the resource properties, and the offset of the data from the start position of the resource data is found.
If resource data with the specified ID or name is present in the resource data, the offset obtained above is accessed, the data length is found, and all the data stored there is read in, and returned as the return value.
File Manager APIs such as PBOpenRF() also allowed access to the raw resource fork; however, they should be used only for applications such as copying a file Apple strongly warns against using the resource fork as a "second data fork."
From the POSIX interface, the resource fork could be accessed as filename/..namedfork/rsrc or as filename/rsrc; the shorter form was deprecated in Mac OS X v10.4 and removed completely in Mac OS X v10.7.
Data types in a resource fork
The smallest elements making up a resource fork are called data types. There are several data types. After a resource fork is accessed, its contents can be found by reading it in as appropriate for the data types defined in advance. Placing definitions inside the program stating how data is to be treated makes it possible to store resources called TMPL resources as well. Using this method increases the visibility of the data when viewed with a program such as ResEdit, making later editing simpler. As the Macintosh platform originated with Motorola-based processors (68k and PPC), the data is serialized to disk in big-endian format.
The following is a list of the major data types, in alphabetical order.
Major resource types
The type codes below, like the above datatypes, are used as type identifiers for more than resource forks themselves: they are used to identify file themselves, to describe data in the clipboard, and much more.
Note that types must be 4 bytes long, so types like snd and STR actually have a space (0x20) at the end.
Major resource editors
ResEdit Distributed free of charge by Apple. Can be used for visual editing of resource data. If the structure of data is known, it can display a range of different types of data in a visual format. Does not run on modern macOS.
Resorcerer Expensive, but popular, as it can be used for visual editing of many more types of data than ResEdit.
HexEdit A binary editor, which in fact is normally used more for editing the data fork rather than the resource fork.
ResKnife Open-source editor for Mac OS X; no longer maintained.
Rezycle A macOS tool that extracts resources from a resource fork into separate binary files while converting many types into formats suitable for modern development.
resource_dasm An open-source resource extractor for macOS, also capable of converting many resources into modern formats.
Compatibility problems
The complexity of programming with resource forks has led to compatibility problems when accessing other file systems via file sharing protocols such as AFP, SMB, NFS and FTP, when storing to non-HFS volumes, or when transmitting files to other systems in other ways (such as via email). The AFP protocol natively supports Resource Forks, and so resource forks are typically transmitted to these volumes as-is, and stored by the server transparently to clients. The SMB protocol supports a file metadata system similar to Macintosh forks known as Alternate Data Streams (ADSes hereafter). macOS did not support storing resource forks in ADSes on SMB volumes by default until Mac OS X v10.6. In previous versions of the OS, including upgraded versions of 10.6, this feature can be enabled with a param change or by creating a special file.
Networked file sharing protocols such as NFSv3 and FTP do not have a concept of file metadata, and so there is no way to natively store resource forks. This is also true when writing to certain types of local file systems, including UFS, and on SMB volumes where Alternate Data Stream support is not enabled. In those cases, macOS stores metadata and resource forks using a technique called AppleDouble, in which the data fork is written as one file, and the resource fork and metadata are written as an entirely separate file preceded by a "._" naming convention. For example: ExampleFile.psd would contain the data fork, and ._ExampleFile.psd would contain the resource fork and metadata.
Compatibility problems can arise because macOS will handle storage of resource forks differently, depending on macOS version, settings, and file system type. For example, on an SMB network with a mixture of 10.5 and 10.6 clients. A freshly installed 10.6 client will look for and store resource forks on an SMB volume in ADSes, but the 10.5 client will (by default) ignore ADSes and use AppleDouble format to handle forks. If a fileserver supports both AFP and NFS, then clients using NFS will store files in AppleDouble format, whereas AFP users will stored the resource fork natively. In those cases, compatibility can sometimes be maintained by forcing clients to use, or not use, AppleDouble format.
Many fileservers providing AFP support do not natively support resource forks on their local file systems. In those cases the forks may be stored in special ways, such as specially named files, special directories, or even Alternate Data Streams.
Another challenge is preserving resource forks when transmitting files using non-resource fork-aware applications or with certain transfer methods, including email and FTP. A number of file formats, such as MacBinary and BinHex, have been created to handle this. Command-line system tools SplitForks and FixupResourceForks allow manual flattening and merging of resource forks. In addition, a file server seeking to present file systems to Macintosh clients must accommodate the resource fork as well as the data fork of files; UNIX servers providing AFP support usually implement this with hidden directories.
Older applications written with the Carbon API have a potential issue when being ported to the current Intel Macs. While the Resource Manager and operating system know how to deserialize data correctly for common resources like 'snd ' or 'moov', resources created using TMPL resources have to be byte swapped manually to ensure file interoperability between PPC and Intel-based versions of an application. (While the resource map and other implementation details are big-endian, the Resource Manager by itself doesn't have any knowledge of the contents of a generic resource, and so cannot perform the byte swapping automatically.)
Until the advent of Mac OS X v10.4, the standard UNIX command-line utilities in macOS (such as cp and mv) did not respect resource forks. To copy files with resource forks, one had to use ditto or CpMac and MvMac.
Other operating systems
The concept of a resource manager for graphics objects, to save memory, originated in the OOZE package on the Xerox Alto in Smalltalk-76. The concept is now largely universal in all modern operating systems. However, the concept of the resource fork remains peculiar to the Macintosh. Most operating systems used a binary file containing resources, which is then "tacked onto" the end of an existing program file. This solution is used on Microsoft Windows for instance, and similar solutions are used with the X Window System, although the resources are often left as a separate file.
The Windows NT NTFS can support forks (and so can be a file server for Mac files), the native feature providing that support is called an alternate data stream. Windows operating system features (such as the standard Summary tab in the Properties page for non-Office files) and Windows applications are use them and Microsoft was developing a next-generation file system that has this sort of feature as basis.
Early versions of the BeOS implemented a database within the file system, which could be used in a manner analogous to a resource fork. Performance issues led to a change in later releases to a system of complex file system attributes. Under this system resources were handled in a fashion somewhat more analogous to the Mac.
AmigaOS does not use forked files. Its executable files are internally divided into a modular structure of large pieces (hunk) capable of storing code, data, and additional information. Similarly, data and project files have a chunk structure codified in the IFF standard. Other file types are stored similarly to other operating systems. Though not strictly a resource fork, AmigaOS stores meta data in files known as .info files. .info files can be identified by the .info extension; for example, if you save a project to a disk, two files will be saved, MyProject and MyProject.info. MyProject would be the actual project data and MyProject.info would contain the project icon, information regarding which program is needed to open the project (since there is no application binding in AmigaOS), special project options and any user comments. .info files are invisible on the Amiga's desktop (Workbench). The icon on the desktop, taken from the .info itself, is the interface metaphor through which the user interacts both with the project itself and its associated .info file. A dialog box accessible by right-clicking the icon allows the user to see and modify the metadata present in the .info file. .info files can be seen as individual files in the command-line interface or a File manager. Modern AmigaOS clones (AROS, MorphOS and AOS4) inherit the structure (complete with metadata) of the .info files of older AmigaOS versions, and can also accept standard PNG graphic files as icon bitmaps in their .info files.
NeXT operating systems NeXTSTEP and OPENSTEP, their successor, macOS, and other systems like RISC OS implemented another solution. Under these systems the resources are left in an original format, for instance, pictures are included as complete TIFF files instead of being encoded into some sort of container. These resources are then placed in a directory along with the executable code and "raw data". The directory (called a "bundle" or "application directory") is then presented to the user as the application itself. This solution provides all of the same functionality as the resource fork, but allows the resources to be easily manipulated by any application a "resource editor" (like ResEdit) is not needed. From the command-line interface, the bundle appears to be a normal directory. This approach was not an option on the classic Mac OS, since the file system (MFS) did not support separate catalog directories. When catalog file support was included in Mac OS, with the HFS filesystem, the resource fork was retained. macOS does retain the classic Resource Manager API as part of its Carbon libraries for backward compatibility. However, the resources themselves can now be stored in separate data files within the file system the Resource Manager now hides this implementation change from the client code.
See also
Fork (file system)
References
External links
Description of the Resource File Format
Apple Developer Resource Library: Resource Manager Reference
Apple Developer Resource Library: Resource Management, Bundles
The Grand Unified Model History of the resource fork, from folklore.org
Rezycle Resource extraction tool
Mac OS X Services A Mac OS X Service to delete the resource fork of a file through context menu
What's up with Mac OS X Resource forks, Extended Attributes, NTFS Streams and Dot-Underscore files?
When I save a file using SMB protocol, what information is saved in the "dot-underscore" (._) files? How is this information stored on an NTFS file system?
Macintosh operating systems
Apple Inc. file systems
|
464877
|
https://en.wikipedia.org/wiki/Information%20management
|
Information management
|
Information management (IM) concerns a cycle of organizational activity: the acquisition of information from one or more sources, the custodianship and the distribution of that information to those who need it, and its ultimate disposal through archiving or deletion.
This cycle of information organisation involves a variety of stakeholders, including those who are responsible for assuring the quality, accessibility and utility of acquired information; those who are responsible for its safe storage and disposal; and those who need it for decision making. Stakeholders might have rights to originate, change, distribute or delete information according to organisational information management policies.
Information management embraces all the generic concepts of management, including the planning, organizing, structuring, processing, controlling, evaluation and reporting of information activities, all of which is needed in order to meet the needs of those with organisational roles or functions that depend on information. These generic concepts allow the information to be presented to the audience or the correct group of people. After individuals are able to put that information to use, it then gains more value.
Information management is closely related to, and overlaps with, the management of data, systems, technology, processes and – where the availability of information is critical to organisational success – strategy. This broad view of the realm of information management contrasts with the earlier, more traditional view, that the life cycle of managing information is an operational matter that requires specific procedures, organisational capabilities and standards that deal with information as a product or a service.
History
Emergent ideas out of data management
In the 1970s, the management of information largely concerned matters closer to what would now be called data management: punched cards, magnetic tapes and other record-keeping media, involving a life cycle of such formats requiring origination, distribution, backup, maintenance and disposal. At this time the huge potential of information technology began to be recognised: for example a single chip storing a whole book, or electronic mail moving messages instantly around the world, remarkable ideas at the time. With the proliferation of information technology and the extending reach of information systems in the 1980s and 1990s, information management took on a new form. Progressive businesses such as British Petroleum transformed the vocabulary of what was then "IT management", so that “systems analysts” became “business analysts”, “monopoly supply” became a mixture of “insourcing” and “outsourcing”, and the large IT function was transformed into “lean teams” that began to allow some agility in the processes that harness information for business benefit. The scope of senior management interest in information at British Petroleum extended from the creation of value through improved business processes, based upon the effective management of information, permitting the implementation of appropriate information systems (or “applications”) that were operated on IT infrastructure that was outsourced. In this way, information management was no longer a simple job that could be performed by anyone who had nothing else to do, it became highly strategic and a matter for senior management attention. An understanding of the technologies involved, an ability to manage information systems projects and business change well, and a willingness to align technology and business strategies all became necessary.
Positioning information management in the bigger picture
In the transitional period leading up to the strategic view of information management, Venkatraman (a strong advocate of this transition and transformation, proffered a simple arrangement of ideas that succinctly brought together the managements of data, information, and knowledge (see the figure)) argued that:
Data that is maintained in IT infrastructure has to be interpreted in order to render information.
The information in our information systems has to be understood in order to emerge as knowledge.
Knowledge allows managers to take effective decisions.
Effective decisions have to lead to appropriate actions.
Appropriate actions are expected to deliver meaningful results.
This is often referred to as the DIKAR model: Data, Information, Knowledge, Action and Result, it gives a strong clue as to the layers involved in aligning technology and organisational strategies, and it can be seen as a pivotal moment in changing attitudes to information management. The recognition that information management is an investment that must deliver meaningful results is important to all modern organisations that depend on information and good decision-making for their success.
Theoretical background
Behavioural and organisational theories
It is commonly believed that good information management is crucial to the smooth working of organisations, and although there is no commonly accepted theory of information management per se, behavioural and organisational theories help. Following the behavioural science theory of management, mainly developed at Carnegie Mellon University and prominently supported by March and Simon, most of what goes on in modern organizations is actually information handling and decision making. One crucial factor in information handling and decision making is an individual's ability to process information and to make decisions under limitations that might derive from the context: a person's age, the situational complexity, or a lack of requisite quality in the information that is at hand – all of which is exacerbated by the rapid advance of technology and the new kinds of system that it enables, especially as the social web emerges as a phenomenon that business cannot ignore. And yet, well before there was any general recognition of the importance of information management in organisations, March and Simon argued that organizations have to be considered as cooperative systems, with a high level of information processing and a vast need for decision making at various levels. Instead of using the model of the "economic man", as advocated in classical theory they proposed "administrative man" as an alternative, based on their argumentation about the cognitive limits of rationality. Additionally they proposed the notion of satisficing, which entails searching through the available alternatives until an acceptability threshold is met - another idea that still has currency.
Economic theory
In addition to the organisational factors mentioned by March and Simon, there are other issues that stem from economic and environmental dynamics. There is the cost of collecting and evaluating the information needed to take a decision, including the time and effort required. The transaction cost associated with information processes can be high. In particular, established organizational rules and procedures can prevent the taking of the most appropriate decision, leading to sub-optimum outcomes
. This is an issue that has been presented as a major problem with bureaucratic organizations that lose the economies of strategic change because of entrenched attitudes.
Strategic information management
Background
According to the Carnegie Mellon School an organization's ability to process information is at the core of organizational and managerial competency, and an organization's strategies must be designed to improve information processing capability and as information systems that provide that capability became formalised and automated, competencies were severely tested at many levels. It was recognised that organisations needed to be able to learn and adapt in ways that were never so evident before and academics began to organise and publish definitive works concerning the strategic management of information, and information systems. Concurrently, the ideas of business process management and knowledge management although much of the optimistic early thinking about business process redesign has since been discredited in the information management literature. In the strategic studies field, it is considered of the highest priority the understanding of the information environment, conceived as the aggregate of individuals, organizations, and systems that collect, process, disseminate, or act on information. This environment consists of three interrelated dimensions which continuously interact with individuals, organizations, and systems. These dimensions are the physical, informational, and cognitive.
Aligning technology and business strategy with information management
Venkatraman has provided a simple view of the requisite capabilities of an organisation that wants to manage information well – the DIKAR model (see above). He also worked with others to understand how technology and business strategies could be appropriately aligned in order to identify specific capabilities that are needed. This work was paralleled by other writers in the world of consulting, practice and academia.
A contemporary portfolio model for information
Bytheway has collected and organised basic tools and techniques for information management in a single volume. At the heart of his view of information management is a portfolio model that takes account of the surging interest in external sources of information and the need to organise un-structured information external so as to make it useful (see the figure).
Such an information portfolio as this shows how information can be gathered and usefully organised, in four stages:
Stage 1: Taking advantage of public information: recognise and adopt well-structured external schemes of reference data, such as post codes, weather data, GPS positioning data and travel timetables, exemplified in the personal computing press.
Stage 2: Tagging the noise on the world wide web: use existing schemes such as post codes and GPS data or more typically by adding “tags”, or construct a formal ontology that provides structure. Shirky provides an overview of these two approaches.
Stage 3: Sifting and analysing: in the wider world the generalised ontologies that are under development extend to hundreds of entities and hundreds of relations between them and provide the means to elicit meaning from large volumes of data. Structured data in databases works best when that structure reflects a higher-level information model – an ontology, or an entity-relationship model.
Stage 4: Structuring and archiving: with the large volume of data available from sources such as the social web and from the miniature telemetry systems used in personal health management, new ways to archive and then trawl data for meaningful information. Map-reduce methods, originating from functional programming, are a more recent way of eliciting information from large archival datasets that is becoming interesting to regular businesses that have very large data resources to work with, but it requires advanced multi-processor resources.
Competencies to manage information well
In 2004, the management system "Information Management Body of Knowledge" was first published on the World Wide Web
and set out to show that the required management competencies to derive real benefits from an investment in information are complex and multi-layered. The framework model that is the basis for understanding competencies comprises six “knowledge” areas and four “process” areas:
The information management knowledge areas
The IMBOK is based on the argument that there are six areas of required management competency, two of which (“business process management” and “business information management”) are very closely related.
Information technology: The pace of change of technology and the pressure to constantly acquire the newest technological products can undermine the stability of the infrastructure that supports systems, and thereby optimises business processes and delivers benefits. It is necessary to manage the “supply side” and recognise that technology is, increasingly, becoming a commodity.
Information system: While historically information systems were developed in-house, over the years it has become possible to acquire most of the software systems that an organisation needs from the software package industry. However, there is still the potential for competitive advantage from the implementation of new systems ideas that deliver to the strategic intentions of organisations.
Business processes and Business information: Information systems are applied to business processes in order to improve them, and they bring data to the business that becomes useful as business information. Business process management is still seen as a relatively new idea because it is not universally adopted, and it has been difficult in many cases; business information management is even more of a challenge.
Business benefit: What are the benefits that we are seeking? It is necessary not only to be brutally honest about what can be achieved, but also to ensure the active management and assessment of benefit delivery. Since the emergence and popularisation of the Balanced scorecard there has been huge interest in business performance management but not much serious effort has been made to relate business performance management to the benefits of information technology investments and the introduction of new information systems until the turn of the millennium.
Business strategy: Although a long way from the workaday issues of managing information in organisations, strategy in most organisations simply has to be informed by information technology and information systems opportunities, whether to address poor performance or to improve differentiation and competitiveness. Strategic analysis tools such as the value chain and critical success factor analysis are directly dependent on proper attention to the information that is (or could be) managed
The information management processes
Even with full capability and competency within the six knowledge areas, it is argued that things can still go wrong. The problem lies in the migration of ideas and information management value from one area of competency to another. Summarising what Bytheway explains in some detail (and supported by selected secondary references):
Projects: Information technology is without value until it is engineered into information systems that meet the needs of the business by means of good project management.
Business change: The best information systems succeed in delivering benefits through the achievement of change within the business systems, but people do not appreciate change that makes new demands upon their skills in the ways that new information systems often do. Contrary to common expectations, there is some evidence that the public sector has succeeded with information technology induced business change.
Business operations: With new systems in place, with business processes and business information improved, and with staff finally ready and able to work with new processes, then the business can get to work, even when new systems extend far beyond the boundaries of a single business.
Performance management: Investments are no longer solely about financial results, financial success must be balanced with internal efficiency, customer satisfaction, and with organisational learning and development.
Summary
There are always many ways to see a business, and the information management viewpoint is only one way. It is important to remember that other areas of business activity will also contribute to strategy – it is not only good information management that moves a business forwards. Corporate governance, human resource management, product development and marketing will all have an important role to play in strategic ways, and we must not see one domain of activity alone as the sole source of strategic success. On the other hand, corporate governance, human resource management, product development and marketing are all dependent on effective information management, and so in the final analysis our competency to manage information well, on the broad basis that is offered here, can be said to be predominant.
Operationalising information management
Managing requisite change
Organizations are often confronted with many information management challenges and issues at the operational level, especially when organisational change is engendered. The novelty of new systems architectures and a lack of experience with new styles of information management requires a level of organisational change management that is notoriously difficult to deliver. As a result of a general organisational reluctance to change, to enable new forms of information management, there might be (for example): a shortfall in the requisite resources, a failure to acknowledge new classes of information and the new procedures that use them, a lack of support from senior management leading to a loss of strategic vision, and even political manoeuvring that undermines the operation of the whole organisation. However, the implementation of new forms of information management should normally lead to operational benefits.
The early work of Galbraith
In early work, taking an information processing view of organisation design, Jay Galbraith has identified five tactical areas to increase information processing capacity and reduce the need for information processing.
Developing, implementing, and monitoring all aspects of the “environment” of an organization.
Creation of slack resources so as to decrease the load on the overall hierarchy of resources and to reduce information processing relating to overload.
Creation of self-contained tasks with defined boundaries and that can achieve proper closure, and with all the resources at hand required to perform the task.
Recognition of lateral relations that cut across functional units, so as to move decision power to the process instead of fragmenting it within the hierarchy.
Investment in vertical information systems that route information flows for a specific task (or set of tasks) in accordance to the applied business logic.
The matrix organisation
The lateral relations concept leads to an organizational form that is different from the simple hierarchy, the “matrix organization”. This brings together the vertical (hierarchical) view of an organisation and the horizontal (product or project) view of the work that it does visible to the outside world. The creation of a matrix organization is one management response to a persistent fluidity of external demand, avoiding multifarious and spurious responses to episodic demands that tend to be dealt with individually.
See also
Information Management Body of Knowledge
Records management
Knowledge management
Information technology
Information system
Project management
Business process
Balanced scorecard
Strategic management
Data management
Content management
Master of Information Management
Information Resources Management Journal
Journal of Global Information Management
References
External links
Information
Information technology
Information systems
Works about information
|
51705875
|
https://en.wikipedia.org/wiki/Volume%20cartography
|
Volume cartography
|
Volume Cartography is the name of a computer program for locating and mapping 2-dimensional surfaces within a 3-dimensional object. X-rays can reveal minute details of what is in an object, and computer program such as Volume Cartography can organize the images into layers, a process called volume rendering.
Burned scrolls
Ein Gedi is a community that was destroyed by Byzantine emperor Justinian in 800 AD. The burning of the synagogue reduced its scrolls on parchment to lumps of charcoal. The burned scrolls were discovered by archaeologists during an excavation in 1970. They were so fragile that they disintegrated whenever touched. Various attempts were made to mechanically unwind and read the scrolls, but the scrolls were too delicate.
In 2016, W. Brent Seales, a researcher at the University of Kentucky, created a set of computer programs called Volume Cartography to reconstruct the layers of text in a digital X-ray image of the one of the scrolls, known as the En-Gedi Scroll.
Process
Volumetric scan
An X-ray microtomography (Micro-CT) scanner creates a 3-dimensional image of the sample. An X-ray scanner can produce a spot as small as 10 microns.
Segmentation
Surfaces are found and broken into small triangles, resulting in a triangular mesh defining the surface.
Texturing
Each point in the mesh is assigned a weight, indicating the likelihood that the point contains writing.
Flattening
The mesh surface is mapped onto a plane.
Merging
The pieces of the recovered surface are assembled into a single image.
References
Cartography
Data visualization software
Hebrew manuscripts
|
6098774
|
https://en.wikipedia.org/wiki/LAMMPS
|
LAMMPS
|
Large-scale Atomic/Molecular Massively Parallel Simulator (LAMMPS) is a molecular dynamics program from Sandia National Laboratories. LAMMPS makes use of Message Passing Interface (MPI) for parallel communication and is free and open-source software, distributed under the terms of the GNU General Public License.
LAMMPS was originally developed under a Cooperative Research and Development Agreement (CRADA) between two laboratories from United States Department of Energy and three other laboratories from private sector firms. , it is maintained and distributed by researchers at the Sandia National Laboratories and Temple University.
Features
For computing efficiency, LAMMPS uses neighbor lists (Verlet lists) to keep track of nearby particles. The lists are optimized for systems with particles that repel at short distances, so that the local density of particles never grows too large.
On parallel computers, LAMMPS uses spatial-decomposition techniques to partition the simulation domain into small 3d sub-domains, one of which is assigned to each processor. Processors communicate and store ghost atom information for atoms that border their subdomain. LAMMPS is most efficient (in a parallel computing sense) for systems whose particles fill a 3D rectangular box with approximately uniform density.
LAMMPS also allows for coupled spin and molecular dynamics in an accelerated fashion.
LAMMPS is coupled to many analysis tools and engines as well.
See also
Parallel computing
Comparison of software for molecular mechanics modeling
Molecular design software
List of free and open-source software packages
References
External links
Molecular dynamics software
Free science software
Sandia National Laboratories
|
6437056
|
https://en.wikipedia.org/wiki/Dreamlinux
|
Dreamlinux
|
Dreamlinux was a Brazilian computer operating system based on Debian Linux. It can boot as a live CD, from USB flash drive, or can be installed on a hard drive. The distribution's GUI aims to have a centered animated toolbar. As of October 2012, The Dreamlinux Project has been discontinued.
Editions
Dreamlinux 2.2 MM GL Edition (2007)
DreamLinux Multimedia Edition 2.2 with AIGLX provides Beryl-AIGLX by default, which can be utilized after the initial installation. One of its key features is its ability to configure AIGLX for NVIDIA and ATI cards automatically. The distribution received a favorable review for its appearance and functionality.
Dreamlinux 3.0 (2008)
Dreamlinux Desktop Edition 3.0 features a complete redesign. It supports a totally independent architecture named Flexiboost, based on overlaid modules. The feature allows the co-existence of two (or more) separate window managers (currently Gnome and Xfce), sharing the same customized appearance. Both working environments share all the applications available.
In addition to the 700MB iso file (CD image), a 130MB Multimedia Module is also available, including DVD support. This is primarily intended for use when running from USB flash drive, rather than from live-CD mode.
New applications
The following applications were not included in previous releases:
Gthumb (replacing GQview)
Pidgin instant messenger;
Ndiswrapper module
WineHQ + Wine Doors installer
Other improvements
Now booting from any CDROM or DVD-R/W unit
Improved Dreamlinux Control Panel
Improved Dreamlinux Installer
Improved Easy Install application
Theme-Switcher on Gnome changes theme without the need to restart X
Setup-Network Manager for stop, start, restart, stop network on booting, start network on booting. Network is now set up to automatically start during boot.
Cupsys also starts on boot
New wizard for emerald-themes
New wallpapers
New icons
New Avant Window Manager themes and AWN-Dock (check AWN Manager on DCP)
CompizFusion enabler in DCP switches default Engage dock to AWN Dock.
New GDM themes, now featuring countdowns
Dreamlinux 3.5 (2009)
Dreamlinux 3.5 is an update to the original Dreamlinux 3.0 desktop. This release features the XFCE desktop with the Gnome Desktop as an additional option in the form of a module. This release uses the Debian Lenny desktop. It features the Linux kernel version 2.6.28.5 as well as new icons and a new GTK+ theme.
There is also the option to install directly to a USB Memory Stick in two modes.
Live Dream
This runs the same as a Live CD, and does not save changes.
Persistent Dream
This runs as though Dream is installed onto the hard drive, and saves any changes to configuration that are made. It is only recommended for use on USB drives that are 2 GB.
DreamLinux 5.0 (2012)
DreamLinux 5.0 is based on Debian Wheezy 7.0 with Linux kernel 3.1. The only edition available is an ISO image around 956 MB. It features:
Xfce 4.8 desktop with quite similar look to MAC OS X user interface.
Programming environments for Ruby Lua, Vala, C, C++, Python and Perl
Server and network applications: Apache2, PHP5, MySQL, Samba, Netatalk, TorrentFlux, SSH, Bluetooth, Network-Manager, Avahi-Daemon (Bonjour), Preload, Fancontrol, Cpufreqd.
Pre-installed applications for end-users:
Chromium web browser.
Audio, video codec for playing many multimedia formats,
SoftMaker office suite Textmaker, Planmaker and Presentations.
Graphics editors “Gimp and InkScape“, along with shotwell photo manager and FoxitReader PDF reader application.
Dreamlinux 5.0 offers new installer called FlexiBoot which allows users to easily install Dreamlinux 5.0 in USB external hard drive and use it anywhere, or install it to the internal hard drive.
MKDistro is a simple utility that allows users to build their own customized Dreamlinux and Debian-based distribution.
Live USB
A Live USB version of Dreamlinux can be created manually or with UNetbootin.
References
External links
Debian-based distributions
Portuguese-language Linux distributions
Linux distributions
|
65704565
|
https://en.wikipedia.org/wiki/Top%20%28song%29
|
Top (song)
|
"Top" (stylized in all caps) is a song recorded by South Korean boy band Stray Kids. It was released in three languages. The Korean version and English version were released digitally on May 3 and 20, 2020, respectively, through JYP Entertainment, and distributed by Dreamus. The Japanese version was released on June 3, as their first Japanese single, titled "Top -Japanese ver.-", through Epic Records Japan. The song was featured as an opening theme song for the anime television series Kami no Tō -Tower of God-, together with its B-side "Slump", as an ending theme song.
The song debuted atop the Oricon Singles Chart with 37,000 copies and topped at number eight on the Billboard Japan Hot 100. The song also received a gold certification from the Recording Industry Association of Japan.
Release and promotion
On March 25, 2020, "Top" appeared for the first time on the promotional opening video for the anime television series Kami no Tō -Tower of God-. The Japanese version was announced to be released on June 3 under title "Top -Japanese ver.-", in 5 physical-format editions: First Press Limited edition A, First Press Limited edition B, Production Limited edition (anime), Regular edition, and Complete Limited edition (cassette). The stand-alone single version of "Top" and "Slump" were released on April 28 and May 6, respectively, and released officially digitally on May 26.
The Korean and English versions of "Top" were announced on May 11, 2021. The Korean version was released on May 13, and the English on May 20 to digital and streaming platform only. The Korean version of "Top" and "Slump" were later included on Stray Kids' first studio album Go Live, while the Japanese versions were included on their first Japanese extended play, All In.
The Korean version of "Top" was performed along with the lead single from Go Live, "God's Menu" on Mnet's M Countdown and MBC's Show! Music Core on June 18 and 20, respectively. The Japanese version of "Slump" was performed for the first time on the YouTube program channel The First Take on June 26, made Stray Kids the first foreign singer to appear in the program.
Lyrics and composition
"Top" is a pop rock and EDM song written by the group's producer 3Racha and Armadillo, and co-composed with Rangga and Gwon Yeong-chan. The Japanese version added KM-MARKIT to write the Japanese lyrics. The song expresses the powerful melody, full of fighting spirit lyrics and magnificent worldview of the anime, and composed in the key of G major, 98 beats per minute with a running time of 3 minutes and 5 seconds or 3 minutes and 8 seconds for the Japanese version.
The B-side "Slump" is a rock song written by Han from 3Racha and co-composed with Bang Chan. The Japanese version added KM-MARKIT to write the Japanese lyrics. The song describes inner anxiety and weak emotions, and composed in the key of G major, 98 beats per minute with a running time of 2 minutes and 14 seconds or 2 minutes and 17 seconds for the Japanese version.
Commercial performance
The Japanese version of "Top" debuted number one on the Oricon Singles Chart for the chart issue date of June 15, 2020, selling 37,157 copies, made Stray Kids the fourth foreign male artist to debut at number one with the first single in history, after Jang Keun-suk ("Let Me Cry"), Exo ("Love Me Right (Romantic Universe)"), and iKon ("Dumb & Dumber").
On Billboard Japan Hot 100, "Top" debuted at number 78. In its second week dated June 15, 2020, the song jumped to number 8 due to releasing a physical format. The song also peaked at number two on the Hot Animation, and number one on the Top Singles Sales, selling 49,329 copies. On the Billboard's World Digital Song Sales, "Top" charted and peaked at number 10, and "Slump" peaked at number 17.
On April 10, 2021, "Top" (Japanese version) received a gold certification from the Recording Industry Association of Japan (RIAJ), denoting shipments of 100,000 copies, making Stray Kids' first Japanese release achieve it.
Music video
The music video "Top" Japanese version was premiered on May 26, 2020, directed by Oui Kim. The music video shows the members in action scenes, seems to have expressed a song image with Stray Kids' own strong intention to go for the top. The Korean version music video was uploaded on June 10, as a "unveil: track" of their debut studio album Go Live.
The music video "Slump" in Japanese version was uploaded on May 11, 2020. It shows recording scenes alternate with anime scenes from Kami no Tō -Tower of God-.
Track listing
Digital download / streaming – Korean version
"Top" (Tower of God OP) – 3:05
"Slump" (Tower of God ED) – 2:14
Digital download / streaming – English version
"Top" (English version) – 3:05
"Slump" (English version) – 2:14
CD single / cassette / digital download / streaming – Japanese version (except production limited edition)
"Top" (Japanese version) – 3:08
"Slump" (Japanese version) – 2:17
"Top" (instrumental) – 3:08
"Slump" (instrumental) – 2:17
CD single – Japanese version (production limited edition)
"Top" (Japanese version) – 3:08
"Slump" (Japanese version) – 2:17
"Top" (Japanese version; Kami no Tō -Tower of God- version) – 1:31
"Slump" (Japanese version; Kami no Tō -Tower of God- version) – 1:29
DVD – Japanese version (first press limited A)
"2019.12.1 "Tokyo" Behind the Scenes Video"
"2019.12.2 SKZ2020 Jacket Making of Video"
"2019.12.2–3 Stray Kids Japan Showcase 2019 "Hi-Stay" Documentary"
"2020.3.19 "Top (Japanese ver.)" Jacket Making of Video"
Notes
Credits and personnel
Credits adapted from Melon.
Recording and management
Recorded at W Sound
Mixed at JYPE Studios and Glab Studios
Mastered at 821 Sound
Personnel
"Top"
Stray Kids – lead vocals
Bang Chan (3Racha) – lyrics, composition, arrangement, computer programming, background vocals
Changbin (3Racha) – lyrics, composition, background vocals
Han (3Racha) – lyrics, composition, background vocals
Armadillo – lyrics, composition, arrangement, computer programming, piano
Rangga – composition, arrangement, computer programming
Gwon Yeong-chan – composition, arrangement
KM-MARKIT – Japanese lyrics
PLZY – background vocals
Jung Yu-ra – digital editing
Ejo IM – recording
Lee Tae-sub – mixing
Kwon Nam-woo – mastering
"Slump"
Stray Kids – lead vocals
Han (3Racha) – lyrics, composition, background vocals
Bang Chan (3Racha) – composition, arrangement, computer programming, background vocals
KM-MARKIT – Japanese lyrics
Seoko IM – digital editing, recording
Ejo IM – recording
Shin Bong-won – mixing
Kwon Nam-woo – mastering
Charts
Weekly charts
Monthly charts
Year-end charts
Accolades
Certifications
Release history
See also
List of Oricon number-one singles of 2020
References
External links
2020 singles
2020 songs
Anime songs
English-language South Korean songs
Japanese-language songs
JYP Entertainment singles
Korean-language songs
Oricon Weekly number-one singles
Stray Kids songs
|
65265682
|
https://en.wikipedia.org/wiki/Tartar%20%281787%20ship%29
|
Tartar (1787 ship)
|
Tartar (later Tartar Packet) was launched on the River Thames in 1787. Initially, she traded between London and Smyrna. Between 1792 and 1794 she made one voyage to Bengal and back carrying dispatches for the British East India Company (EIC). On her return she became a packet for the Post Office Packet Service, sailing from Falmouth, Cornwall. In June 1796 she was bringing mail from New York back to Falmouth when a French privateer captured her.
Career
Tartar first appeared in Lloyd's Register (LR) in 1787.
The information in LR suggests that on her return from the Mediterranean St Barbe sold Tartar to new owners who may have intended to use her as a slave ship.
However, although Lloyd's Lists ship arrival and departure (SAD) data showed Captain Cummings at Gravesend awaiting to sail to Africa, there is no evidence that he ever did so. The data in LR was only as accurate as owners chose to keep it, and generally signaled intentions. Unfortunately, missing volumes of LR and missing pages in extant issues make it impossible to document any correction.
On 29 August 1792 the EIC's Court of Directors took up Tartar to sail as a packet to Bengal, and to remain there. She was to be ready by mid-September.
Captain Timothy Goldsmith sailed Tartar from Portsmouth on 1 October for Bengal. She arrived there on 28 February 1793. She sailed from Bengal on 2 April, but a few days later struck a rock in the Bengal River and had to put back. She sailed again on 17 May and was at St Helena from 4 to 12 September. On 18 September she was off Ascension Island. Tartar Packet sailed on to Cork and from there to Portsmouth, where she arrived on 30 December. She arrived at Gravesend on 17 January 1794. Tartar had sailed from Bengal before news of the outbreak of war with France had reached there. Still, Captain Timothy Goldsmith was issued a letter of marque on 29 August 1793, i.e., before he had even arrived at St Helena.
The first mention of Tartar Packet in Lloyd's Register (LR) occurred in 1794.
On 21 March 1794 Tartar Packet, Kerr, master, arrived at Falmouth from London. Then on 9 April Tartar Packet, Kerr, master, sailed from Falmouth to Corunna. For the next year plus she sailed back and forth between Falmouth and Corunna. On one voyage she brought back to Falmouth over £300,000 in remittances. On another, as she was sailing to Corunna a French ship of 18 guns chased her for six hours. She was almost taken, but escaped in the night. Command of the packet alternated between Captain Kerr (or Carr), and Captain Masden.
On 25 May 1796 Tartar Packet, Kerr, master, sailed for Halifax, Nova Scotia. He arrived there on 28 June and sailed for Falmouth on 6 July, arriving at Falmouth on 24 July.
On 3 November, Tartar Packet, Causer, master, (or Bullmore; sources differ), again sailed for Halifax. On 27 November She encountered a terrible storm that lasted 24 hours. Captain Causer stated that the storm was the worst that he had seen in his 25 years at sea. Tartar Packet arrived at Halifax on 9 December and left on 28 December. She arrived back at Falmouth on 13 January 1796.
Fate
On 19 March 1796 Tartar Packet, Crosier, master, sailed from Falmouth, bound for New York. She was at Halifax between 24 April and early May, and arrived at New York on 14 May. She sailed from NY circa 15 June. On 18 June the French privateer Eagle, of 14 guns, captured her. Eagle also captured Georges, Forbes, master, which had been sailing from London to New Brunswick. Eagle took her prizes into Boston.
There were subsequent reports that the French were fitting out Tartar Packet to cruise as a privateer under the French flag.
Notes, citations, and references
Notes
Citations
References
1787 ships
Age of Sail merchant ships of England
Ships of the British East India Company
Falmouth Packets
Whaling ships
Captured ships
|
14525038
|
https://en.wikipedia.org/wiki/Incredibuild
|
Incredibuild
|
Incredibuild is a suite of grid computing software developed by Incredibuild Ltd. Incredibuild is designed to help accelerate computationally-intensive tasks by distributing them over the network, with notable applications including compiling source code, building software generally, and other software development-related tasks. Jobs can be distributed to several computers over a network, giving both the possibility of accelerating the work by using more resources than were available on the initiating computer alone and potentially freeing local resources for other tasks.
Incredibuild tools are available for Microsoft Windows and Linux, and have out-of-the-box support for accelerating builds targeting those platforms as well as Android,
Nintendo Switch, PlayStation 4, Xbox One, and other platforms. Originally sold specifically as a tool to accelerate compiling, IncrediBuild can now be used for other development processes as well as general high performance computing.
Tools
Incredibuild's software suite is broken up into several, separately-licensable tools. Incredibuild for Visual Studio C/C++ provides Visual Studio integration to accelerate builds of C and C++ projects. Incredibuild for Make and Other Build Tools provides integration with several standard build tools including make, CMake, and MSBuild. Incredibuild for Dev Tools provides additional interfaces for distributing jobs, which need not necessarily be building or compiling-related.
Notable users
Incredibuild has several software development companies as customers, including a number of video game developers. Turn 10 Studios, for instance, used Incredibuild to accelerate builds, rendering from 3DS Max, code analysis, and other tasks during the development of Forza 5. Incredibuild also claims Epic Games, Electronic Arts, id Software, Bohemia Interactive, Scaleform Corporation, FromSoftware, and Bugbear Entertainment as clients. CryEngine and Unreal Engine include built-in support for build acceleration via Incredibuild.
Development
Incredibuild, Ltd. is an Israeli company based in Tel Aviv, with Incredibuild as its only selling product. In 2002 they introduced Incredibuild v1.0, offering a solution for acceleration of Microsoft Visual Studio 6.0 C/C++ code builds. Incredibuild 1.3 was awarded with Game Developer Magazine's annual Front Line Award in the category of Programming for the year of 2003.
After adding support to Visual Studio .NET and Visual Studio 2005, Incredibuild later expanded Incredibuild with what was at the time called "XGE Interfaces". This package allowed customers to implement custom acceleration of jobs which were not necessarily compilation-related, by exposing a set of interfaces to Incredibuild's core grid engine technology.
In 2008, Incredibuild won a "Productivity Award" in the Change and Configuration Management category of the 18th annual Jolt Awards.
See also
Distcc
Electric Cloud
References
External links
Incredibuild review
Compiling tools
Grid computing
Programming tools for Windows
|
22193744
|
https://en.wikipedia.org/wiki/Thalerastria
|
Thalerastria
|
Thalerastria is a genus of moths of the family Noctuidae. The genus was described by Staudinger in 1898.
Taxonomy
Butterflies and Moths of the World gives this name as a synonym of Eulocastra Butler, 1886.
Species
Thalerastria alfierii Wiltshire, 1948 Arabia
Thalerastria diaphora (Staudinger, 1878) Algeria, Morocco, Turkey, Israel, Jordan, Lebanon, Armenia, Syria, Iran, Iraq, Kazakhstan, Afghanistan, Pakistan, southern European Russia, Arabia, Egypt, Sudan, Eritrea, India
Thalerastria hampsoni (Hacker, 2016) Somalia
Thalerastria lehmanni Hoppe & Fibiger, 2009 Morocco, Libya, Tunisia, Spain
Thalerastria meyi (Hacker, 2016) South Africa
Thalerastria ochrographa (Hacker & Saldaitis, 2016) Oman
Thalerastria phaeoxantha (Hacker, 2016) Ethiopia, Kenya
Thalerastria rex Wiltshire, 1948 Arabia
Thalerastria saldaitis (Hacker, 2016) Sokotra
Thalerastria tenuifascia (Hacker, 2016) Kenya
References
Acontiinae
|
271525
|
https://en.wikipedia.org/wiki/Soulseek
|
Soulseek
|
Soulseek is a peer-to-peer (P2P) file-sharing network and application. The term Soulseek might refer to (1) one of the two networks, or (2) one of the three official user client interfaces. Soulseek is used mostly to exchange music, although users are able to share a variety of files. Soulseek was created by Nir Arbel, an Israeli programmer from Safed.
Two independent networks have made up Soulseek since 2006, both run by the same management. The older and now the less used one is accessed by Soulseek client 156; the newer network and one with greatest usage is accessed by Soulseek client 157 (Windows only) or SoulseekQt (Microsoft Windows, macOS, or Linux platforms). There are reportedly five times more users on the network accessed by clients 157/Qt than 156 as of August 2011.
New developments are solely on the SoulseekQt client interface. Work on Client 157 (Windows only) stopped in 2008. SoulseekQt has somewhat different functionality compared to the 157 client interface.
Key features
Content
As a peer to peer (P2P) file sharing program, the accessible content is determined by the users of the Soulseek client, and what files they choose to share. The network has historically had a diverse mix of music, including underground and independent artists, unreleased music, such as demos and mixtapes, bootlegs, live tracks, and live DJ sets, but releases from major and independent labels can also be found.
Central server
Soulseek depends on a pair of central servers. One server supports the original client and network Version 156, with the other supporting the newer network (functioning with clients 157 and Qt). While these central servers are key to coordinating searches and hosting chat rooms, they do not actually play a part in the transfer of files between users, which takes place directly between the users concerned. (See Single Source Downloads below).
Searching
Users can search for items; the results returned being a list of files whose names match the search term used. Searches may be explicit or may use wildcards/patterns or terms to be excluded. For example, searching for blue suede -shoes will return a list of files whose names containing the strings blue and suede, but files containing the string shoes in their names will be excluded.
A feature specific to the Soulseek search engine is the inclusion of the folder names and file paths in the search list. This allows users to search by folder name. For example, typing in experimental will return all the files that are contained in folders having that name, providing quick access to bands and albums in a determined musical genre.
The list of search results shows details, such as the full name and path of the file, its size, the user who is hosting the file, together with that users' average transfer rate, and brief details about the encoded track itself, such as bit rate, length, etc. The resulting search list may then be sorted in a variety of ways and individual files (or folders) chosen for download.
The Soulseek protocol search algorithms are not published, as those algorithms run on the server.
Single source (one-to-one) downloads
Soulseek does not support multi-source downloading or "swarming" like other post-Napster clients, and must fetch a requested file from a single source. (By contrast, swarming allows a requested file to be sourced from a number of users who have that file, thus pieces of the file may be downloaded concurrently from a number of sources, typically giving improved performance.)
Banning
All Soulseek clients contain a ban feature whereby selected users may be banned from requesting files. This is in response to users who might be free-riding (i.e. taking files from others without sharing any files themselves) or who might be causing a nuisance for other reasons, such as a personal argument through the chat facilities or just taking up a user's bandwidth by downloading too many files, or simply on the whim of the banning user. Banning can be a contentious subject, and was the subject of much discussion in the user forums particularly in the early days. Users with download privileges can still be banned.
Album downloads
While Soulseek, like other P2P clients, allows a user to download individual files from another by selecting each one from a list of search results, a Download Containing Folder option simplifies the downloading of entire albums. For example, a user who wishes to facilitate the distribution of an entire album may place all tracks relating to the album together in a folder on the host PC, and the entire contents of that folder (i.e. all the album's track files) can then be downloaded automatically one after the other using this one command.
File transfer monitoring
The Soulseek client features two file transfer monitoring windows where the progress of files being uploaded and downloaded can be monitored and controlled.
User profiles
Users may complete a profile which contains basic free-form text information (e.g. basic information about themselves or their 'file transfer rules') together with a list of things they like, a list of things they dislike, and optionally an image file. These items may then be viewed by other users when selecting the username from a list of members in a chat room or a list of files returned by a search.
The list of items a user likes may also be used to obtain global rankings for that item in the Soulseek community or to obtain recommendations from other users who have the same items in their list of things they like.
Wishlists
The Soulseek 156, 157 and Qt clients provide a "wishlist" feature which functions like a stored search. Search terms are input as entries in a wishlist and each wishlist entry is then periodically executed as a search automatically by the client software, returning results as appropriate.
Privileges
While the Soulseek software is free, a donation scheme exists to support the programming effort and cost of maintaining the servers. In return for donations, users are granted the privilege of being able to jump ahead of non-donating users in a queue when downloading files (but only if the files are not shared over a local area network).
Support forums and blog
Like numerous other software titles, Soulseek has a set of forums where users may seek help on a variety of topics, such as technical aspects of using the software. Separate forums now support clients 156 and 157, and Qt. The first blog was created in the latter part of 2003.
Financing
Soulseek is entirely financed by donations, with no advertising or user fees. Nir Arbel writes, as of July 1, 2008:
Copyright issues
Soulseek claims to be against copyright violation and that the purpose of their service is to promote unsigned artists.
This is a quote from their homepage:
Soulseek was taken to court in 2008 by two French music industry groups. The groups alleged that Soulseek is designed to permit unauthorized access to copyrighted works.
History
The original Soulseek user base around 2000 was composed mostly of members of the IDM mailing list, and most of the music first found on Soulseek was underground electronic music or music created by the users themselves. Aided by Soulseek users, the developer Nir Arbel released new versions of the client very frequently, in response to user requests for new features or bug fixes.
There is no known published usage data. Soulseek got a first boost in 2001 when Napster was closed down and then a second boost in 2002 when the site Audiogalaxy was closed down. Nir Arbel stated in an interview published December 26, 2003 that there were, at that time, over a million registered usernames and that 80,000–100,000 users log on during peak hours. The increase in Soulseek users after the shutdown of Audiogalaxy was plainly evident from a before-and-after comparison of chat room populations. Before the shutdown of its competitor, Soulseek's most-joined chat rooms averaged 50 or so people. After the shutdown, the population of these chat rooms increased to 100 or more.
Soulseek is more of a community than a simple file sharing client. In Soulseek, users can connect with other users with similar music tastes to share files and to chat. Users even have the ability to create their own chat rooms and invite other users with similar tastes to discuss their favorite music. Many musicians from the electronic scene are themselves too part of this Soulseek community. In summer 2004, Soulseek users from all the world met in Augsburg, Germany. Every year since then, that meeting still takes place at a digital arts festival called Lab30 (30 being the street number of the Abraxas Theater) in Augsburg, Germany, organized by longtime Soulseek user Manfred Genther and other Augsburg locals. This festival focuses on showcasing digital musicians, digital artists, and netlabels from all over the world. Many Soulseek artists have performed at the festival, and a large number of them have performed live for the very first time there. Lab30 has steadily grown in size since the first event and continues to be a meeting place for the musicians and users of Soulseek. Attendees usually come from all over Europe and the United States. Lab30 is a well known event in Augsburg and widely supported and cherished by the Augsburg music and art scene.
Soulseek Records
Many of the original Soulseek users are also music producers, and Soulseek Records (not to be confused with "SLSK Records") was formed in 2002.
Versions
The first release was 139, which ran for about 12 months from 2002–03. Following a change in servers, a new version was released to coincide with this event. Whilst the main interface has largely remained unchanged since its inception, additional features such as the chat room 'ticker' were introduced into the 156 version.
Version 156 first appeared in 2005. A second 'test' version of the server, version 157, was set up shortly afterwards, which became the primary client in 2008.
Since July 6, 2008, there have been two versions of the Soulseek client, with entirely different users, user groups, and files. The older version, v.156 is progressively being wound down, but still operates as of August 2011, albeit with few users. Users are not obligated to upgrade, and new users may still inadvertently download the 156 client.
The 157 "test" network has been around since 2005, to circumvent poor search capability on the 156 client. The v.157 test 12c was released in November 2007. All recent versions have several bugs which can hang or cause the system to stop searching or downloading.
The client SoulseekQT Public Build 1 was released in 04/19/2011.
For the older clients (156 and 157) no official client was developed for non-Windows operating systems, but a number of unofficial third-party clients existed at the time. Development of third-party clients was discouraged (but not prohibited), as coding errors or explicit circumvention of network rules in third-party clients had, at times, a drastic negative impact on the Soulseek network.
Alternative Clients
Nicotine+ is an actively maintained fork of the now defunct Nicotine client. Nicotine+ runs under Linux and Windows. It is currently maintained by a team of volunteers with its source hosted on GitHub. It uses Gtk+ 3, Python 3, and supports UPnP. Stable and unstable packages are available for Ubuntu. Nicotine+ is also available as a Flatpak, as of release version 2.0.0
Nicotine+'s defunct predecessor Nicotine also ran on all Unix-based systems, such as Mac OS X, and on Microsoft Windows. It is in turn based on the original PySoulSeek project. It may still be available from some package distributors on Linux-based systems.
PySoulSeek was a Soulseek client written in Python that runs under Linux/FreeBSD/Solaris and other Unix-based operating systems. PySoulSeek runs under Mac OS X but with some difficulty.
Seeker is a Soulseek client for modern Android devices. GoSeek was a Soulseek client for older Android devices (before Android Nougat).
MewSeek was originally iSlsk, a Soulseek client for iPod Touch and iPhone clients running jailbroken versions of iOS. MewSeek no longer supports Soulseek.
Clients for Mac OS X included Soulseex (ssX) and iSoul. iSoul was based on an earlier client called Solarseek.
References
External links
File sharing software
2002 software
Windows file sharing software
MacOS file sharing software
File sharing software for Linux
Classic Mac OS software
Proprietary freeware for Linux
|
7894099
|
https://en.wikipedia.org/wiki/Microsoft%20Robotics%20Developer%20Studio
|
Microsoft Robotics Developer Studio
|
Microsoft Robotics Developer Studio (Microsoft RDS, MRDS) is a discontinued Windows-based environment for robot control and simulation that was aimed at academic, hobbyist, and commercial developers and handled a wide variety of robot hardware. It required the Microsoft Windows 7 operating system or later.
RDS is based on CCR (Concurrency and Coordination Runtime): a .NET-based concurrent library implementation for managing asynchronous parallel tasks. This technique involves using message-passing and a lightweight services-oriented runtime, DSS (Decentralized Software Services), which allows the orchestration of multiple services to achieve complex behaviors.
Features include: a visual programming tool, Microsoft Visual Programming Language for creating and debugging robot applications, web-based and windows-based interfaces, 3D simulation (including hardware acceleration), easy access to a robot's sensors and actuators. The primary programming language is C#.
Microsoft Robotics Developer Studio includes support for packages to add other services to the suite. Those currently available include Soccer Simulation and Sumo Competition by Microsoft, and a community-developed Maze Simulator, a program to create worlds with walls that can be explored by a virtual robot, and a set of services for OpenCV. Most of the additional packages are hosted on CodePlex (search for Robotics Studio). Course materials are also available.
Components
There are four main components in RDS:
CCR (Concurrency and Coordination Runtime)
DSS (Decentralized Software Services)
VPL (Visual Programming Language)
VSE (Visual Simulation Environment)
CCR and DSS are also available separately for use in commercial applications that require a high level
of concurrency and/or must be distributed across multiple nodes in a network. This package is called the CCR and DSS Toolkit.
Tools
The tools that allow to develop an MRDS application contain a graphical environment (Microsoft Visual Programming Language : VPL) command line tools allow you to deal with Visual Studio projects (VS Express version is enough) in C#, and 3D simulation tools.
Visual Programming Language is a graphical development environment that uses a service and activity catalog.
They can interact graphically, a service or an activity is represented by a block that has inputs and outputs that just need to be dragged from the catalog to the diagram.
Linking can be done with the mouse, it allows you to define if signals are simultaneous or not, permits you to perform operations on transmitted values...
VPL also allows you to generate the code of new "macro" services from diagrams created by users.
It is possible in VPL to easily customize services for different hardware elements.
RDS 3D simulation environment allows you to simulate the behavior of robots in a virtual world using NVIDIA PhysX technology (3D engine originally written by Ageia) that includes advanced physics.
There are several simulation environments in RDS. These environments were developed by SimplySim
Apartment
Factory
Modern House
Outdoor
Urban
Many examples and tutorials are available for the different tools, which permits a fast understanding of MRDS. Several applications have been added to the suite, such as Maze Simulator, or Soccer Simulation which is developed by Microsoft.
The Kinect sensor can be used on a robot in the RDS environment. RDS also includes a simulated Kinect sensor. The Kinect Services for RDS are licensed for both commercial and non-commercial use. They depend on the Kinect for Windows SDK.
Notable applications
Princeton University's DARPA Urban Grand Challenge autonomous car entry was programmed with MRDS.
MySpace uses MRDS's parallel computing foundation libraries, CCR and DSS, for a non-robotic application in the back end of their site.
Indiana University uses MRDS in a non-robotic application to coordinate a high-performance computing network.
In 2008 Microsoft launched a simulated robotics competition named RoboChamps using MRDS, four challenges were available : maze, sumo, urban, and Mars rover. the simulated environment and robots used by the competition were created by SimplySim and the competition was sponsored by KIA Motors
The 2009 robotics and algorithm section of the Imagine Cup software competition uses MRDS visual simulation environment. The challenges of this competition were also developed by SimplySim and are improved versions of the RoboChamps challenges.
Critique
The complication and overhead required to run MRDS prompted Princeton Autonomous Vehicle Engineering to convert their Prospect 12 system from MRDS to IPC++.
The main RDS4 website was last updated on 2012-06-29. (In fact, the product no longer exists).
Versions and Licensing
Robotics Studio 1.0 (Commercial and Non-Commercial Use Licenses) -- Release Date: December 18, 2006
Robotics Studio 1.5 (Commercial and Non-Commercial Use Licenses) -- Release Date: May 2007
Robotics Studio 1.5 "Refresh" (Commercial and Non-Commercial Use Licenses) -- Release Date: December 13, 2007
Robotics Developer Studio 2008 Standard Edition (Commercial Use), Academic Edition (Academic use) and Express Edition (Commercial and Non-Commercial Use) -- Release Date: November 18, 2008
Robotics Developer Studio 2008 R2 Standard Edition (Commercial Use), Academic Edition (Academic use) and Express Edition (Commercial and Non-Commercial Use) -- Release Date: June 17, 2009
Robotics Developer Studio 2008 R3—Release Date: May 20, 2010. With R3, Robotics Developer Studio 2008 is now free and the functionality of all editions and CCR & DSS Toolkit has been combined into the single free edition. R3 is no longer compatible with .NET Compact Framework development and it no longer supports Windows CE.
Robotics Developer Studio 4 -- Release Date: March 8, 2012. This release adds full support for the Kinect sensor via the Kinect for Windows SDK V1. A Reference Platform Design is included in the documentation, with the first implementation being the Eddie robot from Parallax. It also updates RDS to .NET 4.0 and XNA 4.0.
Supported robots
ABB Group Robotics - ABB Connect for Microsoft Robotics Developer Studio
Adept MobileRobots Pioneers (first robots to run under MRDS) Pioneer DX and Pioneer AT Official WebSite (Subsumed under reference design)
Aldebaran Robotics Nao Official WebSite (Support dropped in latest version)
Arieh Robotics Project Junior (Physical computing PC) Official WebSite
CoroWare CoroBot and Explorer Official Website
Lego Mindstorms NXT Official Website
Lego Mindstorms RCX (Support dropped in Robotics Developer Studio 2008)
iRobot Create
KUKA Robotics Educational Framework
Parallax Boe-Bot
Parallax Scribbler. Through IPRE.
Parallax Eddie robot. Supported directly by software available for download from Parallax.
fischertechnik FT16 (Supported through MRDS Codeplex Samples)
Robosoft's robots Official WebSite
Kondo KHR-1 (Supported through MRDS Codeplex Samples)
Segway RMP Official WebSite by: Ben Axelrod
Surveyor SRV-1
RoboticsConnection Traxster. Link r
uBot-5 from the Laboratory For Perceptual Robotics at University of Massachusetts Amherst
Vex Robotics Design System available at CodePlex
WowWee RoboSapien, via the USB-UIRT device
ZMP INC. e-nuvo WALK Official Website
CNRobot Co. Ltd CRX10 Official Website
Robotino from Festo Didactic Germany
Microsoft Robotics and the Future
Microsoft Robotics Developer Studio has not been updated or patched since version 4.0, which was released on March 8, 2012.
On September 22, 2014, as part of Microsoft's restructuring plan, the Robotics division of Microsoft Research was suspended, according to a tweet from Ashley Feniello, a principal developer at Microsoft Robotics division of MSR (Microsoft Research). It is now highly unlikely that MRDS will ever be updated again, however forum members (MVPs) may still offer limited support.
See also
Player Project – used in research and post-secondary education (open source and free)
Webots
Project Chrono
Concurrency and Coordination Runtime
URBI
Robotic mapping
Robot software
Mobile Robot Programming Toolkit
Arduino
Robot Operating System
References
Further reading
External links
Microsoft MSDN robotics pages
Microsoft Robotics Studio: An Introduction
Microsoft Robotics Studio Runtime – An Introduction
MRDS Codeplex Samples (MRDS 2008 R3)
Additional Samples from Professional Robotics Developer Studio textbook (MRDS 2008 R3)
Microsoft Robotics Studio Community - Turkey
Microsoft robotics newsgroup from Google Groups
Channel9 wiki page about Microsoft Robotics Studio
www.Conscious-Robots.com pages for MSRS (Microsoft Robotics Studio)
PhysX by Ageia Home
Robubox's MSRS tutorials and simulator samples Official Website
SimplySim : MRDS 3D simulation company
Imagine Cup 2009 : Robotics & Algorithm
Microsoft development tools
Integrated development environments
Robotics suites
2006 software
2006 in robotics
|
12057519
|
https://en.wikipedia.org/wiki/Internet%20of%20things
|
Internet of things
|
The Internet of things (IoT) describes physical objects (or groups of such objects) that are embedded with sensors, processing ability, software, and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
The field has evolved due to the convergence of multiple technologies, including ubiquitous computing, commodity sensors, increasingly powerful embedded systems, and machine learning. Traditional fields of embedded systems, wireless sensor networks, control systems, automation (including home and building automation), independently and collectively enable the Internet of things. In the consumer market, IoT technology is most synonymous with products pertaining to the concept of the "smart home", including devices and appliances (such as lighting fixtures, thermostats, home security systems and cameras, and other home appliances) that support one or more common ecosystems, and can be controlled via devices associated with that ecosystem, such as smartphones and smart speakers. The IoT can also be used in healthcare systems.
There are a number of concerns about the risks in the growth of IoT technologies and products, especially in the areas of privacy and security, and consequently, industry and governmental moves to address these concerns have begun, including the development of international and local standards, guidelines, and regulatory frameworks.
History
The main concept of a network of smart devices was discussed as early as 1982, with a modified Coca-Cola vending machine at Carnegie Mellon University becoming the first ARPANET-connected appliance, able to report its inventory and whether newly loaded drinks were cold or not. Mark Weiser's 1991 paper on ubiquitous computing, "The Computer of the 21st Century", as well as academic venues such as UbiComp and PerCom produced the contemporary vision of the IOT. In 1994, Reza Raji described the concept in IEEE Spectrum as "[moving] small packets of data to a large set of nodes, so as to integrate and automate everything from home appliances to entire factories". Between 1993 and 1997, several companies proposed solutions like Microsoft's at Work or Novell's NEST. The field gained momentum when Bill Joy envisioned device-to-device communication as a part of his "Six Webs" framework, presented at the World Economic Forum at Davos in 1999.
The concept of the "Internet of things" and the term itself, first appeared in a speech by Peter T. Lewis, to the Congressional Black Caucus Foundation 15th Annual Legislative Weekend in Washington, D.C, published in September 1985. According to Lewis, "The Internet of Things, or IoT, is the integration of people, processes and technology with connectable devices and sensors to enable remote monitoring, status, manipulation and evaluation of trends of such devices."
The term "Internet of things" was coined independently by Kevin Ashton of Procter & Gamble, later MIT's Auto-ID Center, in 1999, though he prefers the phrase "Internet for things". At that point, he viewed radio-frequency identification (RFID) as essential to the Internet of things, which would allow computers to manage all individual things. The main theme of the Internet of things is to embed short-range mobile transceivers in various gadgets and daily necessities to enable new forms of communication between people and things, and between things themselves.
Defining the Internet of things as "simply the point in time when more 'things or objects' were connected to the Internet than people", Cisco Systems estimated that the IoT was "born" between 2008 and 2009, with the things/people ratio growing from 0.08 in 2003 to 1.84 in 2010.
Applications
The extensive set of applications for IoT devices is often divided into consumer, commercial, industrial, and infrastructure spaces.
Consumer applications
A growing portion of IoT devices are created for consumer use, including connected vehicles, home automation, wearable technology, connected health, and appliances with remote monitoring capabilities.
Smart home
IoT devices are a part of the larger concept of home automation, which can include lighting, heating and air conditioning, media and security systems and camera systems. Long-term benefits could include energy savings by automatically ensuring lights and electronics are turned off or by making the residents in the home aware of usage.
A smart home or automated home could be based on a platform or hubs that control smart devices and appliances. For instance, using Apple's HomeKit, manufacturers can have their home products and accessories controlled by an application in iOS devices such as the iPhone and the Apple Watch. This could be a dedicated app or iOS native applications such as Siri. This can be demonstrated in the case of Lenovo's Smart Home Essentials, which is a line of smart home devices that are controlled through Apple's Home app or Siri without the need for a Wi-Fi bridge. There are also dedicated smart home hubs that are offered as standalone platforms to connect different smart home products and these include the Amazon Echo, Google Home, Apple's HomePod, and Samsung's SmartThings Hub. In addition to the commercial systems, there are many non-proprietary, open source ecosystems; including Home Assistant, OpenHAB and Domoticz.
Elder care
One key application of a smart home is to provide assistance to elderly individuals and to those with disabilities. These home systems use assistive technology to accommodate an owner's specific disabilities. Voice control can assist users with sight and mobility limitations while alert systems can be connected directly to cochlear implants worn by hearing-impaired users. They can also be equipped with additional safety features. These features can include sensors that monitor for medical emergencies such as falls or seizures. Smart home technology applied in this way can provide users with more freedom and a higher quality of life.
The term "Enterprise IoT" refers to devices used in business and corporate settings. By 2019, it is estimated that the EIoT will account for 9.1 billion devices.
Organizational applications
Medical and healthcare
The Internet of Medical Things (IoMT) is an application of the IoT for medical and health related purposes, data collection and analysis for research, and monitoring. The IoMT has been referenced as "Smart Healthcare", as the technology for creating a digitized healthcare system, connecting available medical resources and healthcare services.
IoT devices can be used to enable remote health monitoring and emergency notification systems. These health monitoring devices can range from blood pressure and heart rate monitors to advanced devices capable of monitoring specialized implants, such as pacemakers, Fitbit electronic wristbands, or advanced hearing aids. Some hospitals have begun implementing "smart beds" that can detect when they are occupied and when a patient is attempting to get up. It can also adjust itself to ensure appropriate pressure and support is applied to the patient without the manual interaction of nurses. A 2015 Goldman Sachs report indicated that healthcare IoT devices "can save the United States more than $300 billion in annual healthcare expenditures by increasing revenue and decreasing cost." Moreover, the use of mobile devices to support medical follow-up led to the creation of 'm-health', used analyzed health statistics."
Specialized sensors can also be equipped within living spaces to monitor the health and general well-being of senior citizens, while also ensuring that proper treatment is being administered and assisting people to regain lost mobility via therapy as well. These sensors create a network of intelligent sensors that are able to collect, process, transfer, and analyze valuable information in different environments, such as connecting in-home monitoring devices to hospital-based systems. Other consumer devices to encourage healthy living, such as connected scales or wearable heart monitors, are also a possibility with the IoT. End-to-end health monitoring IoT platforms are also available for antenatal and chronic patients, helping one manage health vitals and recurring medication requirements.
Advances in plastic and fabric electronics fabrication methods have enabled ultra-low cost, use-and-throw IoMT sensors. These sensors, along with the required RFID electronics, can be fabricated on paper or e-textiles for wireless powered disposable sensing devices. Applications have been established for point-of-care medical diagnostics, where portability and low system-complexity is essential.
IoMT was not only being applied in the clinical laboratory industry, but also in the healthcare and health insurance industries. IoMT in the healthcare industry is now permitting doctors, patients, and others, such as guardians of patients, nurses, families, and similar, to be part of a system, where patient records are saved in a database, allowing doctors and the rest of the medical staff to have access to patient information. Moreover, IoT-based systems are patient-centered, which involves being flexible to the patient's medical conditions. IoMT in the insurance industry provides access to better and new types of dynamic information. This includes sensor-based solutions such as biosensors, wearables, connected health devices, and mobile apps to track customer behavior. This can lead to more accurate underwriting and new pricing models.
The application of the IoT in healthcare plays a fundamental role in managing chronic diseases and in disease prevention and control. Remote monitoring is made possible through the connection of powerful wireless solutions. The connectivity enables health practitioners to capture patient's data and applying complex algorithms in health data analysis.
Transportation
The IoT can assist in the integration of communications, control, and information processing across various transportation systems. Application of the IoT extends to all aspects of transportation systems (i.e. the vehicle, the infrastructure, and the driver or user). Dynamic interaction between these components of a transport system enables inter- and intra-vehicular communication, smart traffic control, smart parking, electronic toll collection systems, logistics and fleet management, vehicle control, safety, and road assistance.
V2X communications
In vehicular communication systems, vehicle-to-everything communication (V2X), consists of three main components: vehicle to vehicle communication (V2V), vehicle to infrastructure communication (V2I) and vehicle to pedestrian communications (V2P). V2X is the first step to autonomous driving and connected road infrastructure.
Building and home automation
IoT devices can be used to monitor and control the mechanical, electrical and electronic systems used in various types of buildings (e.g., public and private, industrial, institutions, or residential) in home automation and building automation systems. In this context, three main areas are being covered in literature:
The integration of the Internet with building energy management systems in order to create energy-efficient and IOT-driven "smart buildings".
The possible means of real-time monitoring for reducing energy consumption and monitoring occupant behaviors.
The integration of smart devices in the built environment and how they might be used in future applications.
Industrial applications
Also known as IIoT, industrial IoT devices acquire and analyze data from connected equipment, operational technology (OT), locations, and people. Combined with operational technology (OT) monitoring devices, IIoT helps regulate and monitor industrial systems. Also, the same implementation can be carried out for automated record updates of asset placement in industrial storage units as the size of the assets can vary from a small screw to the whole motor spare part, and misplacement of such assets can cause a percentile loss of manpower time and money.
Manufacturing
The IoT can connect various manufacturing devices equipped with sensing, identification, processing, communication, actuation, and networking capabilities. Network control and management of manufacturing equipment, asset and situation management, or manufacturing process control allow IoT to be used for industrial applications and smart manufacturing. IoT intelligent systems enable rapid manufacturing and optimization of new products, and rapid response to product demands.
Digital control systems to automate process controls, operator tools and service information systems to optimize plant safety and security are within the purview of the IIoT. IoT can also be applied to asset management via predictive maintenance, statistical evaluation, and measurements to maximize reliability. Industrial management systems can be integrated with smart grids, enabling energy optimization. Measurements, automated controls, plant optimization, health and safety management, and other functions are provided by networked sensors.
In addition to general manufacturing, IoT is also used for processes in the industrialization of construction.
Agriculture
There are numerous IoT applications in farming such as collecting data on temperature, rainfall, humidity, wind speed, pest infestation, and soil content. This data can be used to automate farming techniques, take informed decisions to improve quality and quantity, minimize risk and waste, and reduce the effort required to manage crops. For example, farmers can now monitor soil temperature and moisture from afar, and even apply IoT-acquired data to precision fertilization programs. The overall goal is that data from sensors, coupled with the farmer's knowledge and intuition about his or her farm, can help increase farm productivity, and also help reduce costs.
In August 2018, Toyota Tsusho began a partnership with Microsoft to create fish farming tools using the Microsoft Azure application suite for IoT technologies related to water management. Developed in part by researchers from Kindai University, the water pump mechanisms use artificial intelligence to count the number of fish on a conveyor belt, analyze the number of fish, and deduce the effectiveness of water flow from the data the fish provide. The FarmBeats project from Microsoft Research that uses TV white space to connect farms is also a part of the Azure Marketplace now.
Maritime
IoT devices are in use monitoring the environments and systems of boats and yachts. Many pleasure boats are left unattended for days in summer, and months in winter so such devices provide valuable early alerts of boat flooding, fire, and deep discharge of batteries. The use of global internet data networks such as Sigfox, combined with long-life batteries, and microelectronics allows the engine rooms, bilge, and batteries to be constantly monitored and reported to a connected Android & Apple applications for example.
Infrastructure applications
Monitoring and controlling operations of sustainable urban and rural infrastructures like bridges, railway tracks and on- and offshore wind-farms is a key application of the IoT. The IoT infrastructure can be used for monitoring any events or changes in structural conditions that can compromise safety and increase risk. The IoT can benefit the construction industry by cost-saving, time reduction, better quality workday, paperless workflow and increase in productivity. It can help in taking faster decisions and save money with Real-Time Data Analytics. It can also be used for scheduling repair and maintenance activities in an efficient manner, by coordinating tasks between different service providers and users of these facilities. IoT devices can also be used to control critical infrastructure like bridges to provide access to ships. Usage of IoT devices for monitoring and operating infrastructure is likely to improve incident management and emergency response coordination, and quality of service, up-times and reduce costs of operation in all infrastructure related areas. Even areas such as waste management can benefit from automation and optimization that could be brought in by the IoT.
Metropolitan scale deployments
There are several planned or ongoing large-scale deployments of the IoT, to enable better management of cities and systems. For example, Songdo, South Korea, the first of its kind fully equipped and wired smart city, is gradually being built, with approximately 70 percent of the business district completed . Much of the city is planned to be wired and automated, with little or no human intervention.
Another application is currently undergoing a project in Santander, Spain. For this deployment, two approaches have been adopted. This city of 180,000 inhabitants has already seen 18,000 downloads of its city smartphone app. The app is connected to 10,000 sensors that enable services like parking search, environmental monitoring, digital city agenda, and more. City context information is used in this deployment so as to benefit merchants through a spark deals mechanism based on city behavior that aims at maximizing the impact of each notification.
Other examples of large-scale deployments underway include the Sino-Singapore Guangzhou Knowledge City; work on improving air and water quality, reducing noise pollution, and increasing transportation efficiency in San Jose, California; and smart traffic management in western Singapore. Using its RPMA (Random Phase Multiple Access) technology, San Diego-based Ingenu has built a nationwide public network for low-bandwidth data transmissions using the same unlicensed 2.4 gigahertz spectrum as Wi-Fi. Ingenu's "Machine Network" covers more than a third of the US population across 35 major cities including San Diego and Dallas. French company, Sigfox, commenced building an Ultra Narrowband wireless data network in the San Francisco Bay Area in 2014, the first business to achieve such a deployment in the U.S. It subsequently announced it would set up a total of 4000 base stations to cover a total of 30 cities in the U.S. by the end of 2016, making it the largest IoT network coverage provider in the country thus far. Cisco also participates in smart cities projects. Cisco has started deploying technologies for Smart Wi-Fi, Smart Safety & Security, Smart Lighting, Smart Parking, Smart Transports, Smart Bus Stops, Smart Kiosks, Remote Expert for Government Services (REGS) and Smart Education in the five km area in the city of Vijaywada.
Another example of a large deployment is the one completed by New York Waterways in New York City to connect all the city's vessels and be able to monitor them live 24/7. The network was designed and engineered by Fluidmesh Networks, a Chicago-based company developing wireless networks for critical applications. The NYWW network is currently providing coverage on the Hudson River, East River, and Upper New York Bay. With the wireless network in place, NY Waterway is able to take control of its fleet and passengers in a way that was not previously possible. New applications can include security, energy and fleet management, digital signage, public Wi-Fi, paperless ticketing and others.
Energy management
Significant numbers of energy-consuming devices (e.g. lamps, household appliances, motors, pumps, etc.) already integrate Internet connectivity, which can allow them to communicate with utilities not only to balance power generation but also helps optimize the energy consumption as a whole. These devices allow for remote control by users, or central management via a cloud-based interface, and enable functions like scheduling (e.g., remotely powering on or off heating systems, controlling ovens, changing lighting conditions etc.). The smart grid is a utility-side IoT application; systems gather and act on energy and power-related information to improve the efficiency of the production and distribution of electricity. Using advanced metering infrastructure (AMI) Internet-connected devices, electric utilities not only collect data from end-users, but also manage distribution automation devices like transformers.
Environmental monitoring
Environmental monitoring applications of the IoT typically use sensors to assist in environmental protection by monitoring air or water quality, atmospheric or soil conditions, and can even include areas like monitoring the movements of wildlife and their habitats. Development of resource-constrained devices connected to the Internet also means that other applications like earthquake or tsunami early-warning systems can also be used by emergency services to provide more effective aid. IoT devices in this application typically span a large geographic area and can also be mobile. It has been argued that the standardization that IoT brings to wireless sensing will revolutionize this area.
Living Lab
Another example of integrating the IoT is Living Lab which integrates and combines research and innovation processes, establishing within a public-private-people-partnership. There are currently 320 Living Labs that use the IoT to collaborate and share knowledge between stakeholders to co-create innovative and technological products. For companies to implement and develop IoT services for smart cities, they need to have incentives. The governments play key roles in smart city projects as changes in policies will help cities to implement the IoT which provides effectiveness, efficiency, and accuracy of the resources that are being used. For instance, the government provides tax incentives and cheap rent, improves public transports, and offers an environment where start-up companies, creative industries, and multinationals may co-create, share a common infrastructure and labor markets, and take advantage of locally embedded technologies, production process, and transaction costs. The relationship between the technology developers and governments who manage the city's assets, is key to provide open access to resources to users in an efficient way.
Military applications
The Internet of Military Things (IoMT) is the application of IoT technologies in the military domain for the purposes of reconnaissance, surveillance, and other combat-related objectives. It is heavily influenced by the future prospects of warfare in an urban environment and involves the use of sensors, munitions, vehicles, robots, human-wearable biometrics, and other smart technology that is relevant on the battlefield.
Internet of Battlefield Things
The Internet of Battlefield Things (IoBT) is a project initiated and executed by the U.S. Army Research Laboratory (ARL) that focuses on the basic science related to the IoT that enhance the capabilities of Army soldiers. In 2017, ARL launched the Internet of Battlefield Things Collaborative Research Alliance (IoBT-CRA), establishing a working collaboration between industry, university, and Army researchers to advance the theoretical foundations of IoT technologies and their applications to Army operations.
Ocean of Things
The Ocean of Things project is a DARPA-led program designed to establish an Internet of things across large ocean areas for the purposes of collecting, monitoring, and analyzing environmental and vessel activity data. The project entails the deployment of about 50,000 floats that house a passive sensor suite that autonomously detect and track military and commercial vessels as part of a cloud-based network.
Product digitalization
There are several applications of smart or active packaging in which a QR code or NFC tag is affixed on a product or its packaging. The tag itself is passive, however, it contains a unique identifier (typically a URL) which enables a user to access digital content about the product via a smartphone. Strictly speaking, such passive items are not part of the Internet of things, but they can be seen as enablers of digital interactions. The term "Internet of Packaging" has been coined to describe applications in which unique identifiers are used, to automate supply chains, and are scanned on large scale by consumers to access digital content. Authentication of the unique identifiers, and thereby of the product itself, is possible via a copy-sensitive digital watermark or copy detection pattern for scanning when scanning a QR code, while NFC tags can encrypt communication.
Trends and characteristics
The IoT's major significant trend in recent years is the explosive growth of devices connected and controlled by the Internet. The wide range of applications for IoT technology mean that the specifics can be very different from one device to the next but there are basic characteristics shared by most.
The IoT creates opportunities for more direct integration of the physical world into computer-based systems, resulting in efficiency improvements, economic benefits, and reduced human exertions.
The number of IoT devices increased 31% year-over-year to 8.4 billion in the year 2017 and it is estimated that there will be 30 billion devices by 2020. The global market value of the IoT is projected to reach $7.1 trillion by 2020.
Intelligence
Ambient intelligence and autonomous control are not part of the original concept of the Internet of things. Ambient intelligence and autonomous control do not necessarily require Internet structures, either. However, there is a shift in research (by companies such as Intel) to integrate the concepts of the IoT and autonomous control, with initial outcomes towards this direction considering objects as the driving force for autonomous IoT. A promising approach in this context is deep reinforcement learning where most of IoT systems provide a dynamic and interactive environment. Training an agent (i.e., IoT device) to behave smartly in such an environment cannot be addressed by conventional machine learning algorithms such as supervised learning. By reinforcement learning approach, a learning agent can sense the environment's state (e.g., sensing home temperature), perform actions (e.g., turn HVAC on or off) and learn through the maximizing accumulated rewards it receives in long term.
IoT intelligence can be offered at three levels: IoT devices, Edge/Fog nodes, and Cloud computing. The need for intelligent control and decision at each level depends on the time sensitiveness of the IoT application. For example, an autonomous vehicle's camera needs to make real-time obstacle detection to avoid an accident. This fast decision making would not be possible through transferring data from the vehicle to cloud instances and return the predictions back to the vehicle. Instead, all the operation should be performed locally in the vehicle. Integrating advanced machine learning algorithms including deep learning into IoT devices is an active research area to make smart objects closer to reality. Moreover, it is possible to get the most value out of IoT deployments through analyzing IoT data, extracting hidden information, and predicting control decisions. A wide variety of machine learning techniques have been used in IoT domain ranging from traditional methods such as regression, support vector machine, and random forest to advanced ones such as convolutional neural networks, LSTM, and variational autoencoder.
In the future, the Internet of things may be a non-deterministic and open network in which auto-organized or intelligent entities (web services, SOA components) and virtual objects (avatars) will be interoperable and able to act independently (pursuing their own objectives or shared ones) depending on the context, circumstances or environments. Autonomous behavior through the collection and reasoning of context information as well as the object's ability to detect changes in the environment (faults affecting sensors) and introduce suitable mitigation measures constitutes a major research trend, clearly needed to provide credibility to the IoT technology. Modern IoT products and solutions in the marketplace use a variety of different technologies to support such context-aware automation, but more sophisticated forms of intelligence are requested to permit sensor units and intelligent cyber-physical systems to be deployed in real environments.
Architecture
IoT system architecture, in its simplistic view, consists of three tiers: Tier 1: Devices, Tier 2: the Edge Gateway, and Tier 3: the Cloud. Devices include networked things, such as the sensors and actuators found in IoT equipment, particularly those that use protocols such as Modbus, Bluetooth, Zigbee, or proprietary protocols, to connect to an Edge Gateway. The Edge Gateway layer consists of sensor data aggregation systems called Edge Gateways that provide functionality, such as pre-processing of the data, securing connectivity to cloud, using systems such as WebSockets, the event hub, and, even in some cases, edge analytics or fog computing. Edge Gateway layer is also required to give a common view of the devices to the upper layers to facilitate in easier management. The final tier includes the cloud application built for IoT using the microservices architecture, which are usually polyglot and inherently secure in nature using HTTPS/OAuth. It includes various database systems that store sensor data, such as time series databases or asset stores using backend data storage systems (e.g. Cassandra, PostgreSQL). The cloud tier in most cloud-based IoT system features event queuing and messaging system that handles communication that transpires in all tiers. Some experts classified the three-tiers in the IoT system as edge, platform, and enterprise and these are connected by proximity network, access network, and service network, respectively.
Building on the Internet of things, the web of things is an architecture for the application layer of the Internet of things looking at the convergence of data from IoT devices into Web applications to create innovative use-cases. In order to program and control the flow of information in the Internet of things, a predicted architectural direction is being called BPM Everywhere which is a blending of traditional process management with process mining and special capabilities to automate the control of large numbers of coordinated devices.
Network architecture
The Internet of things requires huge scalability in the network space to handle the surge of devices. IETF 6LoWPAN would be used to connect devices to IP networks. With billions of devices being added to the Internet space, IPv6 will play a major role in handling the network layer scalability. IETF's Constrained Application Protocol, ZeroMQ, and MQTT would provide lightweight data transport.
Fog computing is a viable alternative to prevent such a large burst of data flow through the Internet. The edge devices' computation power to analyse and process data is extremely limited. Limited processing power is a key attribute of IoT devices as their purpose is to supply data about physical objects while remaining autonomous. Heavy processing requirements use more battery power harming IoT's ability to operate. Scalability is easy because IoT devices simply supply data through the internet to a server with sufficient processing power.
Decentralized IoT
Decentralized Internet of things, or decentralized IoT, is a modified IoT. It utilizes Fog Computing to handle and balance requests of connected IoT devices in order to reduce loading on the cloud servers, and improve responsiveness for latency-sensitive IoT applications like vital signs monitoring of patients, vehicle-to-vehicle communication of autonomous driving, and critical failure detection of industrial devices.
Conventional IoT is connected via a mesh network and led by a major head node (centralized controller). The head node decides how a data is created, stored, and transmitted. In contrast, decentralized IoT attempts to divide IoT systems into smaller divisions. The head node authorizes partial decision making power to lower level sub-nodes under mutual agreed policy. Performance is improved, especially for huge IoT systems with millions of nodes.
Decentralized IoT attempts to address the limited bandwidth and hashing capacity of battery-powered or wireless IoT devices via lightweight blockchain.
Cyberattack identification can be done through early detection and mitigation at the edge nodes with traffic monitoring and evaluation.
Complexity
In semi-open or closed loops (i.e. value chains, whenever a global finality can be settled) the IoT will often be considered and studied as a complex system due to the huge number of different links, interactions between autonomous actors, and its capacity to integrate new actors. At the overall stage (full open loop) it will likely be seen as a chaotic environment (since systems always have finality).
As a practical approach, not all elements in the Internet of things run in a global, public space. Subsystems are often implemented to mitigate the risks of privacy, control and reliability. For example, domestic robotics (domotics) running inside a smart home might only share data within and be available via a local network. Managing and controlling a high dynamic ad hoc IoT things/devices network is a tough task with the traditional networks architecture, Software Defined Networking (SDN) provides the agile dynamic solution that can cope with the special requirements of the diversity of innovative IoT applications.
Size considerations
The Internet of things would encode 50 to 100 trillion objects, and be able to follow the movement of those objects. Human beings in surveyed urban environments are each surrounded by 1000 to 5000 trackable objects. In 2015 there were already 83 million smart devices in people's homes. This number is expected to grow to 193 million devices by 2020.
The figure of online capable devices grew 31% from 2016 to 2017 to reach 8.4 billion.
Space considerations
In the Internet of things, the precise geographic location of a thing—and also the precise geographic dimensions of a thing—will be critical. Therefore, facts about a thing, such as its location in time and space, have been less critical to track because the person processing the information can decide whether or not that information was important to the action being taken, and if so, add the missing information (or decide to not take the action). (Note that some things in the Internet of things will be sensors, and sensor location is usually important.) The GeoWeb and Digital Earth are promising applications that become possible when things can become organized and connected by location. However, the challenges that remain include the constraints of variable spatial scales, the need to handle massive amounts of data, and an indexing for fast search and neighbour operations. In the Internet of things, if things are able to take actions on their own initiative, this human-centric mediation role is eliminated. Thus, the time-space context that we as humans take for granted must be given a central role in this information ecosystem. Just as standards play a key role in the Internet and the Web, geo-spatial standards will play a key role in the Internet of things.
A solution to "basket of remotes"
Many IoT devices have the potential to take a piece of this market. Jean-Louis Gassée (Apple initial alumni team, and BeOS co-founder) has addressed this topic in an article on Monday Note, where he predicts that the most likely problem will be what he calls the "basket of remotes" problem, where we'll have hundreds of applications to interface with hundreds of devices that don't share protocols for speaking with one another. For improved user interaction, some technology leaders are joining forces to create standards for communication between devices to solve this problem. Others are turning to the concept of predictive interaction of devices, "where collected data is used to predict and trigger actions on the specific devices" while making them work together.
Social Internet of things
Social Internet of things (SIoT) is a new kind of IoT that focuses the importance of social interaction and relationship between IoT devices. SIoT is a pattern of how cross-domain IoT devices enabling application to application communication and collaboration without human intervention in order to serve their owners with autonomous services, and this only can be realized when gained low-level architecture support from both IoT software and hardware engineering.
Social Network for IoT Devices (Not Human)
IoT defines a device with an identity like a citizen in a community, and connect them to the internet to provide services to its users. SIoT defines a social network for IoT devices only to interact with each other for different goals that to serve human.
How SIoT different from IoT?
SIoT is different from the original IoT in terms of the collaboration characteristics. IoT is passive, it was set to serve for dedicated purposes with existing IoT devices in predetermined system. SIoT is active, it was programmed and managed by AI to serve for unplanned purposes with mix and match of potential IoT devices from different systems that benefit its users.
How SIoT Works?
IoT devices built-in with sociability will broadcast their abilities or functionalities, and at the same time discovers, navigates and groups with other IoT devices in the same or nearby network for useful service compositions in order to help its users proactively in every day's life especially during emergency.
Social IoT Examples
IoT-based smart home technology monitors health data of patients or aging adults by analyzing their physiological parameters and prompt the nearby health facilities when emergency medical services needed. In case emergency, automatically, ambulance of a nearest available hospital will be called with pickup location provided, ward assigned, patient's health data will be transmitted to the emergency department, and display on the doctor's computer immediately for further action.
IoT sensors on the vehicles, road and traffic lights monitor the conditions of the vehicles and drivers and alert when attention needed and also coordinate themselves automatically to ensure autonomous driving is working normally. Unfortunately if an accident happens, IoT camera will inform the nearest hospital and police station for help.
Social IoT Challenges
Internet of things is multifaceted and complicated. One of the main factors that hindering people from adopting and use Internet of things (IoT) based products and services is its complexity. Installation and setup is a challenge to people, therefore, there is a need for IoT devices to mix match and configure themselves automatically to provide different services at different situation.
System security always a concern for any technology, and it is more crucial for SIoT as not only security of oneself need to be considered but also the mutual trust mechanism between collaborative IoT devices from time to time, from place to place.
Another critical challenge for SIoT is the accuracy and reliability of the sensors. At most of the circumstances, IoT sensors would need to respond in nanoseconds to avoid accidents, injury, and loss of life.
Enabling technologies for IoT
There are many technologies that enable the IoT. Crucial to the field is the network used to communicate between devices of an IoT installation, a role that several wireless or wired technologies may fulfill:
Addressability
The original idea of the Auto-ID Center is based on RFID-tags and distinct identification through the Electronic Product Code. This has evolved into objects having an IP address or URI. An alternative view, from the world of the Semantic Web focuses instead on making all things (not just those electronic, smart, or RFID-enabled) addressable by the existing naming protocols, such as URI. The objects themselves do not converse, but they may now be referred to by other agents, such as powerful centralised servers acting for their human owners. Integration with the Internet implies that devices will use an IP address as a distinct identifier. Due to the limited address space of IPv4 (which allows for 4.3 billion different addresses), objects in the IoT will have to use the next generation of the Internet protocol (IPv6) to scale to the extremely large address space required.
Internet-of-things devices additionally will benefit from the stateless address auto-configuration present in IPv6, as it reduces the configuration overhead on the hosts, and the IETF 6LoWPAN header compression. To a large extent, the future of the Internet of things will not be possible without the support of IPv6; and consequently, the global adoption of IPv6 in the coming years will be critical for the successful development of the IoT in the future.
Application Layer
ADRC defines an application layer protocol and supporting framework for implementing IoT applications.
Short-range wireless
Bluetooth mesh networking – Specification providing a mesh networking variant to Bluetooth low energy (BLE) with an increased number of nodes and standardized application layer (Models).
Light-Fidelity (Li-Fi) – Wireless communication technology similar to the Wi-Fi standard, but using visible light communication for increased bandwidth.
Near-field communication (NFC) – Communication protocols enabling two electronic devices to communicate within a 4 cm range.
Radio-frequency identification (RFID) – Technology using electromagnetic fields to read data stored in tags embedded in other items.
Wi-Fi – Technology for local area networking based on the IEEE 802.11 standard, where devices may communicate through a shared access point or directly between individual devices.
ZigBee – Communication protocols for personal area networking based on the IEEE 802.15.4 standard, providing low power consumption, low data rate, low cost, and high throughput.
Z-Wave – Wireless communications protocol used primarily for home automation and security applications
Medium-range wireless
LTE-Advanced – High-speed communication specification for mobile networks. Provides enhancements to the LTE standard with extended coverage, higher throughput, and lower latency.
5G - 5G wireless networks can be used to achieve the high communication requirements of the IoT and connect a large number of IoT devices, even when they are on the move.
Long-range wireless
Low-power wide-area networking (LPWAN) – Wireless networks designed to allow long-range communication at a low data rate, reducing power and cost for transmission. Available LPWAN technologies and protocols: LoRaWan, Sigfox, NB-IoT, Weightless, RPMA.
Very small aperture terminal (VSAT) – Satellite communication technology using small dish antennas for narrowband and broadband data.
Wired
Ethernet – General purpose networking standard using twisted pair and fiber optic links in conjunction with hubs or switches.
Power-line communication (PLC) – Communication technology using electrical wiring to carry power and data. Specifications such as HomePlug or G.hn utilize PLC for networking IoT devices.
Standards and standards organizations
This is a list of technical standards for the IoT, most of which are open standards, and the standards organizations that aspire to successfully setting them.
Politics and civic engagement
Some scholars and activists argue that the IoT can be used to create new models of civic engagement if device networks can be open to user control and inter-operable platforms. Philip N. Howard, a professor and author, writes that political life in both democracies and authoritarian regimes will be shaped by the way the IoT will be used for civic engagement. For that to happen, he argues that any connected device should be able to divulge a list of the "ultimate beneficiaries" of its sensor data and that individual citizens should be able to add new organisations to the beneficiary list. In addition, he argues that civil society groups need to start developing their IoT strategy for making use of data and engaging with the public.
Government regulation on IoT
One of the key drivers of the IoT is data. The success of the idea of connecting devices to make them more efficient is dependent upon access to and storage & processing of data. For this purpose, companies working on the IoT collect data from multiple sources and store it in their cloud network for further processing. This leaves the door wide open for privacy and security dangers and single point vulnerability of multiple systems. The other issues pertain to consumer choice and ownership of data and how it is used. Though still in their infancy, regulations and governance regarding these issues of privacy, security, and data ownership continue to develop. IoT regulation depends on the country. Some examples of legislation that is relevant to privacy and data collection are: the US Privacy Act of 1974, OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data of 1980, and the EU Directive 95/46/EC of 1995.
Current regulatory environment:
A report published by the Federal Trade Commission (FTC) in January 2015 made the following three recommendations:
Data security – At the time of designing IoT companies should ensure that data collection, storage and processing would be secure at all times. Companies should adopt a "defense in depth" approach and encrypt data at each stage.
Data consent – users should have a choice as to what data they share with IoT companies and the users must be informed if their data gets exposed.
Data minimisation – IoT companies should collect only the data they need and retain the collected information only for a limited time.
However, the FTC stopped at just making recommendations for now. According to an FTC analysis, the existing framework, consisting of the FTC Act, the Fair Credit Reporting Act, and the Children's Online Privacy Protection Act, along with developing consumer education and business guidance, participation in multi-stakeholder efforts and advocacy to other agencies at the federal, state and local level, is sufficient to protect consumer rights.
A resolution passed by the Senate in March 2015, is already being considered by the Congress. This resolution recognized the need for formulating a National Policy on IoT and the matter of privacy, security and spectrum. Furthermore, to provide an impetus to the IoT ecosystem, in March 2016, a bipartisan group of four Senators proposed a bill, The Developing Innovation and Growing the Internet of Things (DIGIT) Act, to direct the Federal Communications Commission to assess the need for more spectrum to connect IoT devices.
Approved on 28 September 2018, Senate Bill No. 327 goes into effect on 1 January 2020. The bill requires "a manufacturer of a connected device, as those terms are defined, to equip the device with a reasonable security feature or features that are appropriate to the nature and function of the device, appropriate to the information it may collect, contain, or transmit, and designed to protect the device and any information contained therein from unauthorized access, destruction, use, modification, or disclosure,"
Several standards for the IoT industry are actually being established relating to automobiles because most concerns arising from use of connected cars apply to healthcare devices as well. In fact, the National Highway Traffic Safety Administration (NHTSA) is preparing cybersecurity guidelines and a database of best practices to make automotive computer systems more secure.
A recent report from the World Bank examines the challenges and opportunities in government adoption of IoT. These include –
Still early days for the IoT in government
Underdeveloped policy and regulatory frameworks
Unclear business models, despite strong value proposition
Clear institutional and capacity gap in government AND the private sector
Inconsistent data valuation and management
Infrastructure a major barrier
Government as an enabler
Most successful pilots share common characteristics (public-private partnership, local, leadership)
In early December 2021, the U.K. government introduced the Product Security and Telecommunications Infrastructure bill (PST), an effort to legislate IoT distributors, manufacturers, and importers to meet certain cybersecurity standards. The bill also seeks to improve the security credentials of consumer IoT devices.
Criticism, problems and controversies
Platform fragmentation
The IoT suffers from platform fragmentation, lack of interoperability and common technical standards a situation where the variety of IoT devices, in terms of both hardware variations and differences in the software running on them, makes the task of developing applications that work consistently between different inconsistent technology ecosystems hard. For example, wireless connectivity for IoT devices can be done using Bluetooth, Zigbee, Z-Wave, LoRa, NB-IoT, Cat M1 as well as completely custom proprietary radios – each with its own advantages and disadvantages; and unique support ecosystem.
The IoT's amorphous computing nature is also a problem for security, since patches to bugs found in the core operating system often do not reach users of older and lower-price devices. One set of researchers say that the failure of vendors to support older devices with patches and updates leaves more than 87% of active Android devices vulnerable.
Privacy, autonomy, and control
Philip N. Howard, a professor and author, writes that the Internet of things offers immense potential for empowering citizens, making government transparent, and broadening information access. Howard cautions, however, that privacy threats are enormous, as is the potential for social control and political manipulation.
Concerns about privacy have led many to consider the possibility that big data infrastructures such as the Internet of things and data mining are inherently incompatible with privacy. Key challenges of increased digitalization in the water, transport or energy sector are related to privacy and cybersecurity which necessitate an adequate response from research and policymakers alike.
Writer Adam Greenfield claims that IoT technologies are not only an invasion of public space but are also being used to perpetuate normative behavior, citing an instance of billboards with hidden cameras that tracked the demographics of passersby who stopped to read the advertisement.
The Internet of Things Council compared the increased prevalence of digital surveillance due to the Internet of things to the conceptual panopticon described by Jeremy Bentham in the 18th Century. The assertion was defended by the works of French philosophers Michel Foucault and Gilles Deleuze. In Discipline and Punish: The Birth of the Prison Foucault asserts that the panopticon was a central element of the discipline society developed during the Industrial Era. Foucault also argued that the discipline systems established in factories and school reflected Bentham's vision of panopticism. In his 1992 paper "Postscripts on the Societies of Control," Deleuze wrote that the discipline society had transitioned into a control society, with the computer replacing the panopticon as an instrument of discipline and control while still maintaining the qualities similar to that of panopticism.
Peter-Paul Verbeek, a professor of philosophy of technology at the University of Twente, Netherlands, writes that technology already influences our moral decision making, which in turn affects human agency, privacy and autonomy. He cautions against viewing technology merely as a human tool and advocates instead to consider it as an active agent.
Justin Brookman, of the Center for Democracy and Technology, expressed concern regarding the impact of the IoT on consumer privacy, saying that "There are some people in the commercial space who say, 'Oh, big data – well, let's collect everything, keep it around forever, we'll pay for somebody to think about security later.' The question is whether we want to have some sort of policy framework in place to limit that."
Tim O'Reilly believes that the way companies sell the IoT devices on consumers are misplaced, disputing the notion that the IoT is about gaining efficiency from putting all kinds of devices online and postulating that the "IoT is really about human augmentation. The applications are profoundly different when you have sensors and data driving the decision-making."
Editorials at WIRED have also expressed concern, one stating "What you're about to lose is your privacy. Actually, it's worse than that. You aren't just going to lose your privacy, you're going to have to watch the very concept of privacy be rewritten under your nose."
The American Civil Liberties Union (ACLU) expressed concern regarding the ability of IoT to erode people's control over their own lives. The ACLU wrote that "There's simply no way to forecast how these immense powers – disproportionately accumulating in the hands of corporations seeking financial advantage and governments craving ever more control – will be used. Chances are big data and the Internet of Things will make it harder for us to control our own lives, as we grow increasingly transparent to powerful corporations and government institutions that are becoming more opaque to us."
In response to rising concerns about privacy and smart technology, in 2007 the British Government stated it would follow formal Privacy by Design principles when implementing their smart metering program. The program would lead to replacement of traditional power meters with smart power meters, which could track and manage energy usage more accurately. However the British Computer Society is doubtful these principles were ever actually implemented. In 2009 the Dutch Parliament rejected a similar smart metering program, basing their decision on privacy concerns. The Dutch program later revised and passed in 2011.
Data storage
A challenge for producers of IoT applications is to clean, process and interpret the vast amount of data which is gathered by the sensors. There is a solution proposed for the analytics of the information referred to as Wireless Sensor Networks. These networks share data among sensor nodes that are sent to a distributed system for the analytics of the sensory data.
Another challenge is the storage of this bulk data. Depending on the application, there could be high data acquisition requirements, which in turn lead to high storage requirements. Currently the Internet is already responsible for 5% of the total energy generated, and a "daunting challenge to power" IoT devices to collect and even store data still remains.
Security
Security is the biggest concern in adopting Internet of things technology, with concerns that rapid development is happening without appropriate consideration of the profound security challenges involved and the regulatory changes that might be necessary.
Most of the technical security concerns are similar to those of conventional servers, workstations and smartphones. These concerns include using weak authentication, forgetting to change default credentials, unencrypted messages sent between devices, SQL injections, Man-in-the-middle attacks, and poor handling of security updates. However, many IoT devices have severe operational limitations on the computational power available to them. These constraints often make them unable to directly use basic security measures such as implementing firewalls or using strong cryptosystems to encrypt their communications with other devices - and the low price and consumer focus of many devices makes a robust security patching system uncommon.
Rather than conventional security vulnerabilities, fault injection attacks are on the rise and targeting IoT devices. A fault injection attack is a physical attack on a device to purposefully introduce faults in the system to change the intended behavior. Faults might happen unintentionally by environmental noises and electromagnetic fields. There are ideas stemmed from control-flow integrity (CFI) to prevent fault injection attacks and system recovery to a healthy state before the fault.
Internet of things devices also have access to new areas of data, and can often control physical devices, so that even by 2014 it was possible to say that many Internet-connected appliances could already "spy on people in their own homes" including televisions, kitchen appliances, cameras, and thermostats. Computer-controlled devices in automobiles such as brakes, engine, locks, hood and trunk releases, horn, heat, and dashboard have been shown to be vulnerable to attackers who have access to the on-board network. In some cases, vehicle computer systems are Internet-connected, allowing them to be exploited remotely. By 2008 security researchers had shown the ability to remotely control pacemakers without authority. Later hackers demonstrated remote control of insulin pumps and implantable cardioverter defibrillators.
Poorly secured Internet-accessible IoT devices can also be subverted to attack others. In 2016, a distributed denial of service attack powered by Internet of things devices running the Mirai malware took down a DNS provider and major web sites. The Mirai Botnet had infected roughly 65,000 IoT devices within the first 20 hours. Eventually the infections increased to around 200,000 to 300,000 infections. Brazil, Colombia and Vietnam made up of 41.5% of the infections. The Mirai Botnet had singled out specific IoT devices that consisted of DVRs, IP cameras, routers and printers. Top vendors that contained the most infected devices were identified as Dahua, Huawei, ZTE, Cisco, ZyXEL and MikroTik. In May 2017, Junade Ali, a Computer Scientist at Cloudflare noted that native DDoS vulnerabilities exist in IoT devices due to a poor implementation of the Publish–subscribe pattern. These sorts of attacks have caused security experts to view IoT as a real threat to Internet services.
The U.S. National Intelligence Council in an unclassified report maintains that it would be hard to deny "access to networks of sensors and remotely-controlled objects by enemies of the United States, criminals, and mischief makers... An open market for aggregated sensor data could serve the interests of commerce and security no less than it helps criminals and spies identify vulnerable targets. Thus, massively parallel sensor fusion may undermine social cohesion, if it proves to be fundamentally incompatible with Fourth-Amendment guarantees against unreasonable search." In general, the intelligence community views the Internet of things as a rich source of data.
On 31 January 2019, the Washington Post wrote an article regarding the security and ethical challenges that can occur with IoT doorbells and cameras: "Last month, Ring got caught allowing its team in Ukraine to view and annotate certain user videos; the company says it only looks at publicly shared videos and those from Ring owners who provide consent. Just last week, a California family's Nest camera let a hacker take over and broadcast fake audio warnings about a missile attack, not to mention peer in on them, when they used a weak password"
There have been a range of responses to concerns over security. The Internet of Things Security Foundation (IoTSF) was launched on 23 September 2015 with a mission to secure the Internet of things by promoting knowledge and best practice. Its founding board is made from technology providers and telecommunications companies. In addition, large IT companies are continually developing innovative solutions to ensure the security of IoT devices. In 2017, Mozilla launched Project Things, which allows to route IoT devices through a safe Web of Things gateway. As per the estimates from KBV Research, the overall IoT security market would grow at 27.9% rate during 2016–2022 as a result of growing infrastructural concerns and diversified usage of Internet of things.
Governmental regulation is argued by some to be necessary to secure IoT devices and the wider Internet – as market incentives to secure IoT devices is insufficient. It was found that due to the nature of most of the IoT development boards, they generate predictable and weak keys which make it easy to be utilized by Man-in-the-middle attack. However, various hardening approaches were proposed by many researchers to resolve the issue of SSH weak implementation and weak keys.
Safety
IoT systems are typically controlled by event-driven smart apps that take as input either sensed data, user inputs, or other external triggers (from the Internet) and command one or more actuators towards providing different forms of automation. Examples of sensors include smoke detectors, motion sensors, and contact sensors. Examples of actuators include smart locks, smart power outlets, and door controls. Popular control platforms on which third-party developers can build smart apps that interact wirelessly with these sensors and actuators include Samsung's SmartThings, Apple's HomeKit, and Amazon's Alexa, among others.
A problem specific to IoT systems is that buggy apps, unforeseen bad app interactions, or device/communication failures, can cause unsafe and dangerous physical states, e.g., "unlock the entrance door when no one is at home" or "turn off the heater when the temperature is below 0 degrees Celsius and people are sleeping at night". Detecting flaws that lead to such states, requires a holistic view of installed apps, component devices, their configurations, and more importantly, how they interact. Recently, researchers from the University of California Riverside have proposed IotSan, a novel practical system that uses model checking as a building block to reveal "interaction-level" flaws by identifying events that can lead the system to unsafe states. They have evaluated IotSan on the Samsung SmartThings platform. From 76 manually configured systems, IotSan detects 147 vulnerabilities (i.e., violations of safe physical states/properties).
Design
Given widespread recognition of the evolving nature of the design and management of the Internet of things, sustainable and secure deployment of IoT solutions must design for "anarchic scalability." Application of the concept of anarchic scalability can be extended to physical systems (i.e. controlled real-world objects), by virtue of those systems being designed to account for uncertain management futures. This hard anarchic scalability thus provides a pathway forward to fully realize the potential of Internet-of-things solutions by selectively constraining physical systems to allow for all management regimes without risking physical failure.
Brown University computer scientist Michael Littman has argued that successful execution of the Internet of things requires consideration of the interface's usability as well as the technology itself. These interfaces need to be not only more user-friendly but also better integrated: "If users need to learn different interfaces for their vacuums, their locks, their sprinklers, their lights, and their coffeemakers, it's tough to say that their lives have been made any easier."
Environmental sustainability impact
A concern regarding Internet-of-things technologies pertains to the environmental impacts of the manufacture, use, and eventual disposal of all these semiconductor-rich devices. Modern electronics are replete with a wide variety of heavy metals and rare-earth metals, as well as highly toxic synthetic chemicals. This makes them extremely difficult to properly recycle. Electronic components are often incinerated or placed in regular landfills. Furthermore, the human and environmental cost of mining the rare-earth metals that are integral to modern electronic components continues to grow. This leads to societal questions concerning the environmental impacts of IoT devices over their lifetime.
Intentional obsolescence of devices
The Electronic Frontier Foundation has raised concerns that companies can use the technologies necessary to support connected devices to intentionally disable or "brick" their customers' devices via a remote software update or by disabling a service necessary to the operation of the device. In one example, home automation devices sold with the promise of a "Lifetime Subscription" were rendered useless after Nest Labs acquired Revolv and made the decision to shut down the central servers the Revolv devices had used to operate. As Nest is a company owned by Alphabet (Google's parent company), the EFF argues this sets a "terrible precedent for a company with ambitions to sell self-driving cars, medical devices, and other high-end gadgets that may be essential to a person's livelihood or physical safety."
Owners should be free to point their devices to a different server or collaborate on improved software. But such action violates the United States DMCA section 1201, which only has an exemption for "local use". This forces tinkerers who want to keep using their own equipment into a legal grey area. EFF thinks buyers should refuse electronics and software that prioritize the manufacturer's wishes above their own.
Examples of post-sale manipulations include Google Nest Revolv, disabled privacy settings on Android, Sony disabling Linux on PlayStation 3, enforced EULA on Wii U.
Confusing terminology
Kevin Lonergan at Information Age, a business technology magazine, has referred to the terms surrounding the IoT as a "terminology zoo". The lack of clear terminology is not "useful from a practical point of view" and a "source of confusion for the end user". A company operating in the IoT space could be working in anything related to sensor technology, networking, embedded systems, or analytics. According to Lonergan, the term IoT was coined before smart phones, tablets, and devices as we know them today existed, and there is a long list of terms with varying degrees of overlap and technological convergence: Internet of things, Internet of everything (IoE), Internet of goods (supply chain), industrial Internet, pervasive computing, pervasive sensing, ubiquitous computing, cyber-physical systems (CPS), wireless sensor networks (WSN), smart objects, digital twin, cyberobjects or avatars, cooperating objects, machine to machine (M2M), ambient intelligence (AmI), Operational technology (OT), and information technology (IT). Regarding IIoT, an industrial sub-field of IoT, the Industrial Internet Consortium's Vocabulary Task Group has created a "common and reusable vocabulary of terms" to ensure "consistent terminology" across publications issued by the Industrial Internet Consortium. IoT One has created an IoT Terms Database including a New Term Alert to be notified when a new term is published. , this database aggregates 807 IoT-related terms, while keeping material "transparent and comprehensive."
IoT adoption barriers
Lack of interoperability and unclear value propositions
Despite a shared belief in the potential of the IoT, industry leaders and consumers are facing barriers to adopt IoT technology more widely. Mike Farley argued in Forbes that while IoT solutions appeal to early adopters, they either lack interoperability or a clear use case for end-users. A study by Ericsson regarding the adoption of IoT among Danish companies suggests that many struggle "to pinpoint exactly where the value of IoT lies for them".
Privacy and security concerns
As for IoT, especially in regards to consumer IoT, information about a user's daily routine is collected so that the “things” around the user can cooperate to provide better services that fulfill personal preference. When the collected information which describes a user in detail travels through multiple hops in a network, due to a diverse integration of services, devices and network, the information stored on a device is vulnerable to privacy violation by compromising nodes existing in an IoT network.
For example, on 21 October 2016, a multiple distributed denial of service (DDoS) attacks systems operated by domain name system provider Dyn, which caused the inaccessibility of several websites, such as GitHub, Twitter, and others. This attack is executed through a botnet consisting of a large number of IoT devices including IP cameras, gateways, and even baby monitors.
Fundamentally there are 4 security objectives that the IOT system requires: (1) data confidentiality: unauthorized parties cannot have access to the transmitted and stored data; (2) data integrity: intentional and unintentional corruption of transmitted and stored data must be detected; (3) non-repudiation: the sender cannot deny having sent a given message; (4) data availability: the transmitted and stored data should be available to authorized parties even with the denial-of-service (DOS) attacks.
Information privacy regulations also require organizations to practice "reasonable security". California's SB-327 Information privacy: connected devices "would require a manufacturer of a connected device, as those terms are defined, to equip the device with a reasonable security feature or features that are appropriate to the nature and function of the device, appropriate to the information it may collect, contain, or transmit, and designed to protect the device and any information contained therein from unauthorized access, destruction, use, modification, or disclosure, as specified." As each organization's environment is unique, it can prove challenging to demonstrate what "reasonable security" is and what potential risks could be involved for the business. Oregon's HB 2395 also "requires [a] person that manufactures, sells or offers to sell connected device] manufacturer to equip connected device with reasonable security features that protect connected device and information that connected device collects, contains, stores or transmits] stores from access, destruction, modification, use or disclosure that consumer does not authorize."
According to antivirus provider Kaspersky, there were 639 million data breaches of IoT devices in 2020 and 1.5 billion breaches in the first six months of 2021.
Traditional governance structure
A study issued by Ericsson regarding the adoption of Internet of things among Danish companies identified a "clash between IoT and companies' traditional governance structures, as IoT still presents both uncertainties and a lack of historical precedence." Among the respondents interviewed, 60 percent stated that they "do not believe they have the organizational capabilities, and three of four do not believe they have the processes needed, to capture the IoT opportunity." This has led to a need to understand organizational culture in order to facilitate organizational design processes and to test new innovation management practices. A lack of digital leadership in the age of digital transformation has also stifled innovation and IoT adoption to a degree that many companies, in the face of uncertainty, "were waiting for the market dynamics to play out", or further action in regards to IoT "was pending competitor moves, customer pull, or regulatory requirements." Some of these companies risk being "kodaked" – "Kodak was a market leader until digital disruption eclipsed film photography with digital photos" – failing to "see the disruptive forces affecting their industry" and "to truly embrace the new business models the disruptive change opens up." Scott Anthony has written in Harvard Business Review that Kodak "created a digital camera, invested in the technology, and even understood that photos would be shared online" but ultimately failed to realize that "online photo sharing was the new business, not just a way to expand the printing business."
Business planning and project management
According to 2018 study, 70–75% of IoT deployments were stuck in the pilot or prototype stage, unable to reach scale due in part to a lack of business planning.
Even though scientists, engineers, and managers across the world are continuously working to create and exploit the benefits of IoT products, there are some flaws in the governance, management and implementation of such projects. Despite tremendous forward momentum in the field of information and other underlying technologies, IoT still remains a complex area and the problem of how IoT projects are managed still needs to be addressed. IoT projects must be run differently than simple and traditional IT, manufacturing or construction projects. Because IoT projects have longer project timelines, a lack of skilled resources and several security/legal issues, there is a need for new and specifically designed project processes. The following management techniques should improve the success rate of IoT projects:
A separate research and development phase
A Proof-of-Concept/Prototype before the actual project begins
Project managers with interdisciplinary technical knowledge
Universally defined business and technical jargon
See also
5G
Artificial intelligence of things
Automotive security
Big Data
Cloud manufacturing
Cyber-physical system
Data Distribution Service
Digital object memory
Digital twin
Edge computing
Four-dimensional product
Home automation
Indoor positioning system
Industry 4.0
Internet of Military Things
IoT Cloud
IoT Simulation
Open Interconnect Consortium
OpenWSN
Quantified self
Responsive computer-aided design
Smart grid
Web of things
Thread (network protocol)
Matter (standard)
References
Bibliography
Ambient intelligence
Emerging technologies
Technology assessments
Computing and society
Digital technology
21st-century inventions
|
23375081
|
https://en.wikipedia.org/wiki/Hochschule%20Mittweida
|
Hochschule Mittweida
|
The Hochschule Mittweida () is a public university of applied science located in Mittweida, Germany, founded in 1867.
History
The University of Applied Sciences Mittweida is the second-largest public university of applied sciences in Saxony. It has had almost 80,000 alumni from almost 40 countries worldwide. Founded in 1867 as “Technicum”, the university first served the education of machine-building engineers, and it was one of the largest private schools in Germany at the turn of the century. After the takeover by the National Socialists, the “Technicum” lost its status as a private school, and in 1935 became the “Engineering School Mittweida” (Ingenieurschule Mittweida). In the 1960s, due to the success of the electrotechnical training program, the school became the “Engineering College Mittweida”. In 1980, it received the right to award the academic degree of “doctor engineer”. In 1992, after the reunification, the college received a new start as a university of applied sciences. The number of courses of study and the supply of research facilities increased (with a variety of institutes), and the schools of economic sciences, media, and social work were established. Furthermore, the university obtained the right to award doctorates in cooperation with another university as partner. The university builds strong contacts with the economy, focused in particular on small- and medium-sized enterprises in Saxony. The Bologna process has guided the university's development in recent years and has resulted in the establishment of bachelor and master courses. Today the university offers practice-oriented teaching in modern and disabled-friendly facilities, numerous laboratories, and computer pools. The architecture of the buildings combines new with old. In 1998, to reflect its modern role, the university was renamed as the “University of Applied Sciences Mittweida“.
Courses of studies (June 2009)
Bachelor's degrees
Applied Mathematics (Bachelor of Science, fully in English)
Biotechnology / Biocomputer Science (Bachelor of Science)
Business Administration (Bachelor of Arts)
Computer Science (Bachelor of Engineering)
Embedded Systems (Bachelor of Science)
Electrical Engineering (Bachelor of Science)
Industrial Engineering (Bachelor of Engineering)
Information Systems (Bachelor of Science)
Information Technology (Bachelor of Science)
Mechanical Engineering (Bachelor of Engineering)
Mechatronics (Bachelor of Engineering)
Media Management (Bachelor of Arts)
Media Technology (Bachelor of Engineering)
Multimedia Technology (Bachelor of Engineering)
Physical Engineering (Bachelor of Science)
Real Estate and Facilities Management (Bachelor of Engineering)
Social Work (Bachelor of Arts)
Steel and Metal Construction (Bachelor of Engineering)
Bachelor courses in cooperation with AMAK AG (public-private partnership)
Applied Media Economics (Bachelor of Arts)
Business Management (Bachelor of Arts)
Film and Television (Bachelor of Arts)
Health Management (Bachelor of Arts)
Master's Degrees
Applied Mathematics for Network and Data Sciences (Master of Science, fully in English)
Computer Science (Master of Science)
Electrical Engineering (Master of Science)
Industrial Management (Master of Science)
Information and Communication Science (Master of Arts)
Mechanical Engineering (Master of Engineering)
Physical Technology (Master of Science)
Social Work (Master of Arts)
Social Management (Master of Social Management)
Therapeutic oriented Social Work with Children and Teenager (Master of Arts)
German Diploma Degree (FH)
Economics for Engineers (Diploma (FH) - Industrial Engineer)
Further Post-Graduate Studies
German Diploma Degree (FH) Information Technology (Diploma (FH) - Engineer)
In Cooperation with the Centre for Studies and Technology Transfer Weiz and the Ingenium Education in Austria:
Industrial Management (Master of Science)
Information Technology (Diploma (FH) - Engineer)
Mechanical Engineering (Diploma (FH) - Engineer)
Economics for Engineers (Diploma (FH) - Industrial Engineer)
Schools / Faculties
Information Technology & Electrical Engineering
are key technologies for the technical progress. In Mittweida they are especially taught in the fields of automation engineering and energy system technology, communication technology, microelectronics, multimedia technology and embedded systems.
Mechanical & Precision Engineering
This faculty has the longest tradition at the University of AppliedSciences Mittweida, as the “Technikum” was founded for the education of mechanical engineers. Top graduates engineering, it offers many modern courses of studies e.g. mechatronics, real estate management and facilities
management and the Germany-wide unique study course steel and metal construction.
Mathematics/Physics/Computer Science
Economic Sciences
Social Work
Media
Studying in the morning and producing in the afternoon; the media education according to the „Mittweidaer Modell“ combines theory and practice of journalism with media economy and media technology. This interdisciplinary is a role model for many competitive courses of studies in all over Germany.
Research
Research and Teaching cohere at the University of Applied Sciences Mittweida. The diverse research activities can be allocated to the following fields of competences:
Laser technology,
Information and communication technology,
High performance mechanical engineering and mechatronics,
Energy and facility management,
Economic sciences and social sciences,
Media and new media within education,
Environment engineering, medical engineering and biotechnology,
Discrete mathematics (network reliability and graph theory).
The University of Applied Sciences Mittweida occupies leading places in the Germany-wide research ranking of universities of applied sciences. The college contributes in about 80 research projects and maintains diverse national and international relations to science and economy. A variety of collegeassociated and external research facilities are affiliated to the University of Applied Sciences Mittweida. Examples therefore are the Laser Institute Mittelsachsen e.V. and the Sensor Center Mittelsachsen e.V. The Laser Institute works in the fields of consulting, testing as well as research and development of laser technology, laser components and materials as well as process technology. The Sensors Center researches in the field of environment-technical and fibre-optic sensor technology and coordinates common projects between the college, enterprises and research facilities.
The number of doctoral degrees within the cooperative promotion process increases steadily. An important contribution to science development is the scientific exchange with colleagues of the same discipline. The University of Applied Sciences Mittweida hosts an annual International Scientific Conference (IWKM) with different research topics. With this conference the university owns nationwide a unique selling point among the university of applied sciences. With the
Medienforum Mittweida and the congress Social Work and Region, additional conferences are hosted and a variety of workshops and panels are organized. Aside from diverse articles in specialist journals and scientific events, the college's professors publish successful specialist books. By the collaboration on the key projects “Education Portal Saxony” and “Education Marketplace Saxony” for the inauguration of online based education and further education for
“Livelong Learning” the University of Applied Sciences Mittweida helps to form the knowledge transfer of the future. Therefore, e-learning based prototype courses of studies with bachelor and master's degrees in tandem with work are developed for the Saxon economy.
International activities
Within the first decades of the “Technicum” more than half of the students came from abroad; today there are about twenty percent, which is a really high ratio in German comparison. Numerous foreign relationships to Europe, Asia, Africa and America contribute to the internationalisation of the university. There are about 80 partnerships, which create possibilities for students and teachers:
to study and teach abroad,
to improve linguistic competences,
to gain intercultural experiences,
to work on international projects,
to participate in conferences and
to establish international contacts.
Cooperation contracts provide a framework for these activities. Inside the European Union the exchange is strongly determined by the EU-support programme “Erasmus” as a part of the programme “lifelong learning”. Programmes of the German Academic Exchange Service (DAAD) are the basis
of international projects, which are realised in the faculties. Multiple double-track contracts make studying in Mittweida attractive for foreign students. The “Cosmopolitanclub” is intensely dedicated since over a decade as an association of German and foreign students at the University of Applied Sciences Mittweida for socio-cultural support of foreign students.
From winter term 2013/14, the Master's programme Applied Mathematics in Digital Media will be held in English.
Sport and status as partner university of the top class sport
The department for university
sport has a steady place at the University of Applied Sciences Mittweida. A variety of sport scopes, either to learn a sport or as prevention for fitness or to participate in competitions,
are offered. In a three-field gym is trained among others. An own boathouse is available for the canoe training. In the one-semester course Communication Training/Sport, personality building contents with combination of teaching and sports activities are conveyed. Besides university internal competitions, Mittweida's students achieve excellent leading positions in Saxony and nationwide
competitions. As the third university nationwide, the University of Applied Sciences Mittweida attained the status of a partner college of top-class sport. For this purpose the University
of Applied Sciences Mittweida collaborates with the General German College Sports Association (“adh”), the Olympic Base Chemnitz-Dresden and the Sports Association of the State of Saxony.
Living conditions
The student union Freiberg, as a partner of the University of Applied Sciences Mittweida, provides student residencies nearby the college as well as varied catering in the central situated refectory on the campus.
Famous graduates
Siegfried Altmann (1936), Engineer, Professor of Basics and Theoretical Electrical Engineering
August Arnold (1898-1983), co-founder of ARRI, developer of the first single lens reflex camera
(1863-1938), Dutch electrical pioneer who first studied at Mittweida and then at the Hannover Technische Hochschule (now Leibniz University Hannover) in the 1880s, came first to the United States in the 1890s to work for Elihu Thomson and Thomas Alva Edison, then briefly left for Moscow to establish its first power station, and thereafter came back to the Netherlands to create its power grid and several companies, among them the which was responsible for the invention of the first no brake motor in 1921; he perfected the process for making the manufacturing of rayon viable (See AkzoNobel and the American Enka Company).
August Horch (1868–1951), the father of the German automotive giant Audi, studied at the „Technicum“ from 1888-1891. Horch developed the first six-cylinder engine in 1907. The designation Audi is the Latin translation of the name Horch (having to do with hearing).
Walter Bruch (1908–1990) studied from 1928-1931 in Mittweida, before he invented the PAL color television system. The PAL system is in about 60 countries, the most widespread colour television system worldwide, aside from NTSC and SECAM.
Famous baker Hans Bahlsen (1902–1959), son of Hermann Bahlsen, founder of the world-renowned cookie factory, spent 1920-1922 studying in Mittweida. In 1928 he took over the technical management of the „H.-Bahlsen-Keksfabrik“ in Hanover. Bahlsen-cookies are still today among the most demanded ones.
Gerhard Neumann (1917–1997) studied from 1936-1938 in Mittweida. Hired as a testing engineer at General Electric, he developed the jet-engine J-79 and led the company's aircraft engine division (which today is called GE Aviation) as vice president for about 16 years. He received numerous awards, e.g. the „Collier Trophy“, awarded by the admission in the „National Aviation Hall of Fame“ of the US.
A web-based alumni portal offers access for interested people to their alma mater. The university invites chosen alumni age-groups every year in May/June. The society for the promotion of the University of Applied Sciences Mittweida (“Förderkreis Hochschule Mittweida e.V.”) maintains contacts to alumni, initiate and supports projects.
The town Mittweida and surroundings - living here as student
The city with its 800-year-old history is located in the foothills of the Ore Mountains, a one-hour drive south-west of Dresden, the capital of the federal state. Mittweida has 16,000 inhabitants and more than 5,000 students.
See also
Education in Germany
German universities
Free State of Saxony
Germany
References
Notes
brochure Mittweida Ingenieur in aller Welt, published by Hochschule Mittweida (FH) University of Applied Sciences
brochure Hochschule Mittweida - University of Applied Sciences, published by Hochschule Mittweida University of Applied Sciences
External links
Educational institutions established in 1867
Universities and colleges in Saxony
Mittweida
Universities of Applied Sciences in Germany
1867 establishments in Germany
|
23930694
|
https://en.wikipedia.org/wiki/551st%20Signal%20Battalion%20%28United%20States%29
|
551st Signal Battalion (United States)
|
The 551st Signal Battalion is an active duty unit of the United States Army, housed on Fort Gordon. The MACOM for the 551st is (TRADOC) and they fall directly under the 15th Signal Brigade.
The 551st trains the following Signal Corps MOSs:
25B – Information Technology Specialist
25M – Multimedia Illustrators
25N – Nodal Network System Operator/Maintainer
25R – Visual Information Equipment Operator/Maintainer
25S – Satellite Communications Systems Operator/Maintainer
25V – Army Combat Documentation/Production Specialist
46S – Public Affairs Mass Communication Specialist
Additional Skills Identifier (ASI)
25S 1C – Satellite Systems Network Coordinator
History
551st Signal Battalion Lineage
Constituted 10 December 1941 in the Army of the United States as the 551st Signal Aircraft Warning Battalion, Separate
Activated 15 December 1941 at Fort Dix, New Jersey
Redesignated 12 December 1942 as the 551st Signal Aircraft Warning Battalion
Inactivated 1 February 1946 in the Philippine Islands
Redesignated 23 September 1986 as the 551st Signal Battalion and allotted to the Regular Army; Headquarters concurrently transferred to the United States Army Training and Doctrine Command and activated at Fort Gordon, Georgia
Structure
Alpha Company - Prior service Soldiers obtaining a new MOS
Bravo Company - 25S – Satellite Communications Systems Operator/Maintainer Soldiers
Charlie Company - 25N – Nodal Network System Operator/Maintainer and 25B – Information Technology Specialist Soldiers
Delta Company - 25B – Information Technology Specialist Soldiers
Echo Company - 25B – Information Technology Specialist Soldiers
SSD - 25M – Multimedia Illustrators, 25R – Visual Information Equipment Operator/Maintainer, 25V – Army Combat Documentation/Production Specialist, and 46S – Public Affairs Mass Communication Specialist Soldiers
Honors
Campaign Participation Credit
World War II: Northern Solomons; Leyte; Southern Philippines
Decorations
Philippine Presidential Unit Citation for 17 October 1944 to 4 July 1945
Company A additionally entitled to:
Army Superior Unit Award for 1999–2000
References
External links
https://web.archive.org/web/20100610200859/http://www.signal.army.mil/551/index.htm
Signal battalions of the United States Army
|
49008859
|
https://en.wikipedia.org/wiki/Cisco%20IOS%20XE
|
Cisco IOS XE
|
IOS XE is a train of Cisco Systems' widely deployed Internetworking Operating System (IOS), introduced with the ASR 1000 series.
It is built on Linux and provides a distributed software architecture that moves many operating system responsibilities out of the IOS process and has a copy of IOS running as a separate process. Since it runs a copy of IOS, all CLI commands are the same between Cisco IOS and IOS XE, in contrast to IOS XR which has a completely different code base and its developers implemented a different CLI command set.
Releases
IOS XE is released separately for ASR 1000 and Catalyst 3850.
Differences between IOS and IOS XE
Cisco IOS is a monolithic operating system running directly on the hardware while IOS XE is a combination of a Linux kernel and a monolithic application (IOSd) that runs on top of this kernel. On the other hand, IOS XR is based on QNX (since version 5.0 it's also based on linux) where the IOSd application has been separated into many different applications. While IOS XE (IOSd) and IOS share a lot of the same code, IOS XR is a completely different code base.
Since IOS XE has IOSd running as an application on top of Linux, it becomes possible to also run different applications on the hardware, a good example of this is running Wireshark on a switch. Another example is the Cisco IOS XE Open Service Containers.
See also
Cisco IOS
Cisco IOS XR
Cisco NX-OS
References
External links
Cisco products
|
5305909
|
https://en.wikipedia.org/wiki/Nanjing%20Olympic%20Sports%20Centre
|
Nanjing Olympic Sports Centre
|
The Nanjing Olympic Sports Centre Stadium () is used mostly for football as well as for other sport of athletics. It is located in Hexi New Town, Nanjing, Jiangsu, China, and covers an area of 89.6 hectares, with a total construction area of about 401,000 square meters.
Served as the main venue for the 2014 Summer Youth Olympics and for the 2005 National Games of China, the Nanjing Olympic Sports Centre is the largest social utility project by the People's Government of Jiangsu Province. The 4 billion yuan Olympic standard complex was designed by HOK Sport (now Populous).
The Olympic Park includes a 61,443 seat multiuse stadium (Nanjing Olympic Sports Centre Stadium), 13,000 seat gymnasium, 4,000 seat FINA standard Aquatic complex, 4,000 seat Tennis Centre, 23,000 square meter Information Technology Centre, and various recreational sports fields.
Stadium
The stadium costed 8.698 million yuan with the construction area of 136.34 thousand square meters, with 61,443 seats. It can host track and field, football and many other sporting events and large musical events.
The top of the building adopts a hyperboloid structure. The two red arches tilt 45 degrees outward and have a span of up to 361.58 meters. The track surface was products of the Italian company "Mondo (蒙多)". The screens was made by the Belgian manufacturer Barco, two screens at north and south sides have a total area of 560 square meters, the biggest in China.
The opening and closing ceremonies, track and field, football matches of the 2005 National Games of China were hosted here.
The stadium was also home of Jiangsu Football Club, they were 2020 Chinese Super League champions but the club was dissolved 3 months after the top-tier league win.
Arena
The arena's construction area of about 6 million square meters, sub-main hall and the two parts of the museum, with 13,000 seats, of which a certain number of seats according to different competitions and activities need to be demolished and moved. There are 29 club boxes for indoor venues. In addition to the stadium could be held indoor track and field and cycling outside of all indoor sports competitions, cultural performances and exhibitions and other large events.
Swimming Pool
Swimming pool in full compliance with FINA's construction standards, building area of nearly 3 million square meters, with 4,000 seats, and includes a swimming pool, diving pool, training pool and paddling pool.
Tennis Centre
Tennis Centre of the construction area of nearly 4 million square meters, with 21 required standards in line with international competition venue can accommodate 4,000 people, including a final venue for two of the semi-final venue to accommodate 2,000 people, 14 open-air games venues and four indoor venues.
Information Technology Centre
Information Technology Centre building area of about 23,000 square meters, is the Olympic Sports Centre management centre, it can hold various types of events and activities, press releases, news delivery and conduct of business services. News Centre south built a 100-meter-high elevator tower tourism, through the tower's viewing platforms overlooking the Olympic Sports Centre, Hexi New Urban Area and the nearby Riverview.
Notable events
Jay Chou – The Invincible World Tour (20 & 21 May 2017)
Joker Xue – I Think I've Seen You Somewhere Tour (15 July 2017)
JJ Lin – Sanctuary World Tour (23 June 2018)
References
External links
Sports venues in Nanjing
Football venues in Nanjing
Athletics (track and field) venues in China
Tennis venues in China
Multi-purpose stadiums in China
Sports venues completed in 2005
Olympic Parks
Venues of the 2014 Summer Youth Olympics
Youth Olympic diving venues
Youth Olympic swimming venues
Sports complexes in China
|
361909
|
https://en.wikipedia.org/wiki/Computer%20lab
|
Computer lab
|
A computer lab is a space which provides computer services to a defined community. Computer labs are typically provided by libraries to the public, by academic institutions to students who attend the institution, or by other institutions to the public or to people affiliated with that institution. Users typically must follow a certain user policy to retain access to the computers. This generally consists of the user not engaging in illegal activities or attempting to circumvent any security or content-control software while using the computers. In public settings, computer lab users are often subject to time limits, in order to allow more people a chance to use the lab, whereas in other institutions, computer access typically requires valid personal login credentials, which may also allow the institution to track the user's activities. Computers in computer labs are typically equipped with internet access, while scanners and printers may augment the lab setup. Computers in computer labs are typically arranged either in rows, so that every workstation has a similar view of one end of the room to facilitate lecturing or presentations, or in clusters, to facilitate small group work. In some cases, generally in academic institutions, student laptops or laptop carts take the place of dedicated computer labs, although computer labs still have a place in applications requiring special software or hardware not practically implementable in personal computers.
Purposes
While computer labs are generally multipurpose, some labs may contain computers with hardware or software optimized for certain tasks or processes, depending on the needs of the institution operating the lab. These specialized purposes may include video editing, stock trading, 3-D computer-aided design, programming, and GIS. Increasingly, these have become the main purposes for the existence of traditional desktop-style computer labs, due to rising ownership of inexpensive personal computers making use of the lab only necessary when the expensive, specialized software and more powerful computers needed to run it are required.
Arrangements
Alternatives
In some settings, traditional desktop computer labs are impractical due to the requirement of a dedicated space. Because of this, some labs use laptop carts instead of desktop setups, in order to both save space and give the lab some degree of mobility.
In the context of academic institutions, some traditional desktop computer labs are being phased out in favor of other solutions judged to be more efficient given that most students own personal laptops. One of these solutions is a virtual lab, which can allow users to install software from the lab server onto their own laptops or log into virtual machines remotely, essentially turning their own laptops into lab machines.
Similar spaces
Media lab
A media lab (often referred to as "new media lab" or "media research lab") is a term used for interdisciplinary organizations, collectives or spaces with the main focus on new media, digital culture and technology. The MIT Media Lab is a well-known example of a media lab.
Internet café
An Internet café differs from a computer lab in that usage of a computer lab is generally free for those with access, while Internet cafés charge for computer use. The term 'Internet café' is often used interchangeably with 'computer lab' but may differ from a computer lab in that users can also connect to the Internet using their own computer or device, and users of a computer lab generally do not need any equipment of their own.
See also
Computer science
School library
Kiosk software
Public computer
LAN gaming center
References
External links
Centralized computing
Laboratory types
Rooms
Articles containing video clips
Educational facilities
|
17156914
|
https://en.wikipedia.org/wiki/Computational%20particle%20physics
|
Computational particle physics
|
Computational particle physics refers to the methods and computing tools developed in and used by particle physics research. Like computational chemistry or computational biology, it is, for particle physics both a specific branch and an interdisciplinary field relying on computer science, theoretical and experimental particle physics and mathematics.
The main fields of computational particle physics are: lattice field theory (numerical computations), automatic calculation of particle interaction or decay (computer algebra) and event generators (stochastic methods).
Computing tools
Computer algebra: Many of the computer algebra languages were developed initially to help particle physics calculations: Reduce, Mathematica, Schoonschip, Form, GiNaC.
Data Grid: The largest planned use of the grid systems will be for the analysis of the LHC - produced data. Large software packages have been developed to support this application like the LHC Computing Grid (LCG) . A similar effort in the wider e-Science community is the GridPP collaboration, a consortium of particle physicists from UK institutions and CERN.
Data Analysis Tools: These tools are motivated by the fact that particle physics experiments and simulations often create large datasets, e.g. see references.
Software Libraries: Many software libraries are used for particle physics computations. Also important are packages that simulate particle physics interactions using Monte Carlo simulation techniques (i.e. event generators).
History
Particle physics played a role in the early history of the internet; the World-Wide Web was created by Tim Berners-Lee when working at CERN in 1991.
Computer Algebra
Note: This section contains an excerpt from 'Computer Algebra in Particle Physics' by Stefan Weinzierl
Particle physics is an important field of application for computer algebra and exploits the capabilities of Computer Algebra Systems (CAS). This leads to valuable feed-back for the development of CAS. Looking at the history of computer algebra systems, the first programs date back to the 1960s. The first systems were almost entirely based on LISP ("LISt Programming language"). LISP is an interpreted language and, as the name already indicates, designed for the manipulation of lists. Its importance for symbolic computer programs in the early days has been compared to the importance of FORTRAN for numerical programs in the same period. Already in this first period, the program REDUCE had some special features for the application to high energy physics. An exception to the LISP-based programs was SCHOONSHIP, written in assembler language by Martinus J. G. Veltman and specially designed for applications in particle physics. The use of assembler code lead to an incredible fast program (compared to the interpreted programs at that time) and allowed the calculation of more complex scattering processes in high energy physics. It has been claimed the program's importance was recognized in 1998 by awarding the half of the Nobel prize to Veltman. Also the program MACSYMA deserves to be mentioned explicitly, since it triggered important development with regard to algorithms. In the 1980s new computer algebra systems started to be written in C. This enabled the better exploitation of the resources of the computer (compared to the interpreted language LISP) and at the same time allowed to maintain portability (which would not have been possible in assembler language). This period marked also the appearance of the first commercial computer algebra system, among which Mathematica and Maple are the best known examples. In addition, also a few dedicated programs appeared, an example relevant to particle physics is the program FORM by J. Vermaseren as a (portable) successor to SCHOONSHIP. More recently issues of the maintainability of large projects became more and more important and the overall programming paradigma changed from procedural programming to object-oriented design. In terms of programming languages this was reflected by a move from C to C++. Following this change of paradigma, the library GiNaC was developed. The GiNac library allows symbolic calculations in C++.
Code generation for computer algebra can also be used in this area.
Lattice field theory
Lattice field theory was created by Kenneth Wilson in 1974. Simulation techniques were later developed from statistical mechanics.
Since the early 1980s, LQCD researchers have pioneered the use of massively parallel computers in large scientific applications, using virtually all available computing systems including traditional main-frames, large PC clusters, and high-performance systems. In addition, it has also been used as a benchmark for high-performance computing, starting with the IBM Blue Gene supercomputer.
Eventually national and regional QCD grids were created: LATFOR (continental Europe), UKQCD and USQCD. The ILDG (International Lattice Data Grid) is an international venture comprising grids from the UK, the US, Australia, Japan and Germany, and was formed in 2002.
See also
Les Houches Accords
CHEP Conference
Computational physics
References
External links
Brown University. Computational High Energy Physics (CHEP) group page
International Research Network for Computational Particle Physics . Center for Computational Sciences, Univ. of Tsukuba, Japan.
History of computing at CERN
Computational fields of study
|
321199
|
https://en.wikipedia.org/wiki/Preview%20%28macOS%29
|
Preview (macOS)
|
Preview is the vendor-supplied image viewer and PDF viewer of the macOS operating system. In addition to viewing and printing digital images and Portable Document Format (PDF) files, it can also edit these media types. It employs the Aqua graphical user interface, the Quartz graphics layer, and the ImageIO and Core Image frameworks.
History
Like macOS, Preview originated in the NeXTSTEP operating system by NeXT, where it was part of every release since 1989. Between 2003 and 2005, Apple claimed Preview was the "fastest PDF viewer on the planet."
Supported file types
Preview can open the following file types.
AI – Adobe Illustrator artwork files (if PDF content included in file)
BMP – Windows bitmap files
CR2 – Raw image file used by Canon cameras
DAE – Collada 3D files
DNG – Digital negative files
EPS – Encapsulated PostScript files (after an automatic conversion to PDF)
FAX – Faxes
FPX – FlashPix files
GIF – Graphics Interchange Format files
HDR – High-dynamic-range image files
ICNS – Apple Icon Image files
ICO – Windows icon files
JPEG – Joint Photographic Experts Group files
JPEG 2000 – JPEG 2000 files
OBJ – Wavefront 3D file
OpenEXR – OpenEXR files
PDF – Portable Document Format version 1.5 + some additional features
PICT – QuickDraw image files
PNG – Portable Network Graphics files
PPM – Netpbm Color Image files
PNTG – MacPaint Bitmap Graphic files
PPT – PowerPoint files
PS – Adobe PostScript files (after an automatic conversion to PDF)
PSD – Adobe Photoshop files
QTIF – QuickTime image files
RAD – Radiance 3D Scene Description files
RAW – Raw image files
SGI – Silicon Graphics Image files
STL – STereoLithography 3D format
TGA – TARGA image files
TIF (TIFF) – Tagged Image File Format files
XBM – X BitMap files
The version of Preview included with OS X 10.3 (Panther) could play animated GIF images, for which an optional button could be added to the toolbar. As of OS X 10.4 (Tiger), Preview lost playback functionality and animated GIF files are displayed as individual frames in a numbered sequence.
Features
Editing PDF documents
Preview can encrypt PDF documents, and restrict their use; for example, it is possible to save an encrypted PDF so that a password is required to copy data from the document, or to print it. However, encrypted PDFs cannot be edited further, so the original author should always keep an unencrypted version. A new "edit button" where the picture can be edited is introduced in Version 7. The "edit button" allows options to insert shapes, lines, do cropping, and among other things.
Some features which are otherwise only available in professional PDF editing software are provided by Preview: It is possible to extract single pages out of multi-page documents (e.g. PDF files), sort pages, and drag & drop single or multiple pages between several opened multi-page documents, or into other applications, such as attaching to an opened email message.
Editing images
Preview offers basic image correction tools using Core Image processing technology implemented in macOS, and other features like shape extraction, color extraction, cropping, and rotation tools. When annotating images, Preview uses vector shapes and text until the image is rasterized to JPEG, PNG or another bitmap format. PDF and image documents can also be supplied with keywords, and are then automatically indexed using macOS's system-wide Spotlight search engine.
Import and export
Preview can directly access image scanners supported by macOS and import images from the scanner. Preview can convert between image formats; it can export to BMP, JP2, JPEG, PDF, PICT, PNG, SGI, TGA, and TIFF. Using macOS's print engine (based on CUPS) it is also possible to "print into" a Postscript file, a PDF-X file or directly save the file in iPhoto, for example scanned photos.
Beginning with Mac OS X 10.7 Lion, Preview restricts the Format option popup menu in the Save As dialog to commonly used types. It is possible to access the full format list by holding down the Option key when clicking the Format popup menu. (GIF, ICNS, JPEG, JPEG-2000, Microsoft BMP, Microsoft Icon, OpenEXR, PDF, Photoshop, PNG, SGI, TGA, TIFF.)
Issues
As of OS X 10.9.2, Preview does not support ISO-standardized PDF (ISO 32000), and when saving, destroys aspects of PDF files without warning to the user.
See also
List of PDF software
References
External links
'Mac Basics: Preview app views and edits images and PDFs'
AppleInsider review from 2003
MacProNews article: PDF and Panther: The Hidden Role of PDF in Mac OS X 10.3 from July 2004
Sams Publishing sample chapter on Preview from Mac OS X Panther Applications and Utilities. Includes some instructions for use, with screenshots.
Image viewers
PDF readers
MacOS
|
197825
|
https://en.wikipedia.org/wiki/PmWiki
|
PmWiki
|
PmWiki is wiki software written by Patrick R. Michaud in the PHP programming language,
and since January 2009 PmWiki is actively maintained by Petko Yotov under the oversight of Dr Michaud
It is free software, licensed under the terms of the GNU General Public License.
Design focus
PmWiki is designed to be easy to install and customize as a content management system for creating professional web sites with one to any number of content authors. The software focuses on ease-of-use, so people with little IT or wiki experience will be able to put it to use. The software is also designed to be extensible and customizable. The PmWiki philosophy favours writers over readers, doesn't try to replace HTML, and supports collaborative maintenance of public web pages.
Besides the usual collaborative features such as content management and knowledge base, PmWiki has been used by companies or groups as an internal communication platform with task management and meeting archives. It is also used by university and research teams.
The PmWiki wiki markup shares similarities with MediaWiki (used by Wikipedia) and has a large number of features not found in other wiki engines however its primary goal is to help with the collaborative maintenance of websites. The PmWiki markup engine is highly customizable, allowing adding, modifying or disabling markup rules, and it can support other markup languages. As an example, the Creole specifications can be enabled.
Features
Content storage
PmWiki uses regular files to store content. Each page of the wiki is stored in its own file on the web server. Pages are stored in ASCII or Unicode format and may be edited directly by the wiki administrator. According to the author, "For the standard operations (view, edit, page revisions), holding the information in flat files is clearly faster than accessing them in a database..."
PmWiki is designed to be able to store and retrieve the pages' text and metadata on various systems and formats. It does not support databases in its default installation. However, via plug-ins, PmWiki can use MySQL or SQLite databases for data storage.
PmWiki supports "attachments" (uploads: images or other files) to its wiki pages. The uploads can be attached to a group of pages (default), individually to each page, or to the whole wiki, depending on the content needs and structure. There are PmWiki recipes allowing an easier management of the uploaded files, e.g. deletion or thumbnail/gallery creation.
Wiki structure
In PmWiki, wiki pages are contained within "wiki groups" (or "namespaces"). Each wiki group can have its own configuration options, plug-ins, access control, skin, sidebar (menu), language of the content and of the interface.
By default, PmWiki allows exactly one hierarchical level of the pages ("WikiGroup/WikiPage"), but through recipes, it is possible to have a flat structure (no wiki groups), multiple nested groups, or sub-pages.
Special wiki groups are "PmWiki", Site, SiteAdmin and Category which contain the documentation and some configuration templates.
Templates (skins)
PmWiki offers a skin template scheme that makes it possible to change the look and feel of the wiki or website with a high degree of flexibility in both functionality and appearance.
Access control
PmWiki permits users and administrators to establish password protection for individual pages, groups of pages or the entire site. For example, defined zones may be established to enable collaborative work by certain groups, such as in a company intranet.
Password protection can be applied to reading, editing, uploading to and changing passwords for the restricted zone. The out-of-the box installation uses "shared passwords" rather than login names, but a built-in option can enable a sophisticated user/group based access control system on pages, groups of pages or the whole wiki.
PmWiki can use passwords from config files, special wiki pages, .htpasswd/.htgroup files. There are also user-based authorization possibilities and authentication via various external sources (e.g. LDAP, forum databases etc.).
Customization
PmWiki follows a design philosophy with the main objectives of ease of installation, maintainability, and keeping non-required features out of the core distribution of the software. PmWiki's design encourages customization with a wide selection of custom extensions, known as "recipes" available from the PmWiki Cookbook. Creating and maintaining extensions and custom installations is easy thanks to a number of well documented hooks in the wiki engine.
System requirements
Prerequisites for running the PmWiki wiki engine:
Any supported version of PHP
Any webserver (or hosting plan) that can run PHP scripts (e.g. Apache HTTP Server, Microsoft Microsoft IIS, Lighttpd, Hiawatha, Cherokee).
Write permissions for the webserver user account in the PmWiki tree (required for off-line editing only)
No file type extension restrictions on the webserver (sometimes a problem with free web hosting providers)
There is a "recipe" to allow running PmWiki "Standalone", without a webserver, for example from a Flash USB stick.
Author
PmWiki was written by the university professor and Perl 6 developer Patrick R. Michaud, who owns a trademark on the name "PmWiki". A number of other developers and users write, maintain and discuss "recipes" (special purpose configurations, add-ons, or plug-ins) in the PmWiki Cookbook and "skins" (special purpose alteration to the look and feel of pages)].
Books and articles about PmWiki
The following books mention PmWiki or have dedicated chapters or sections:
Todd Stauffer, How to Do Everything With Your Web 2.0 Blog,
White, Pauxtis, Web 2.0 for Business: Learning the New Tools,
Nancy Courtney, More Technology for the Rest of Us: A Second Primer on Computing for the Non-IT Librarian,
Holtz, Demopoulos, Blogging for Business: Everything You Need to Know And Why You Should Care,
Ebersbach, Glaser, Heigl, Wiki: Kooperation Im Web,
Lange, Christoph (ed.): Wikis und Blogs - Planen, Einrichten, Verwalten, C&L 2006 (German)
PmWiki has been featured in a number of printed and online magazines including
Inc Magazine, Linux Gazette, PCMag,
LXer, Framasoft, Linuxfr''.
The page PmWiki References lists publications about PmWiki in various languages.
See also
Comparison of wiki software
WikiWikiWeb
References
External links
PmWiki Home Page
Free wiki software
Free software programmed in PHP
Free content management systems
|
1134177
|
https://en.wikipedia.org/wiki/I-number
|
I-number
|
i-numbers are a type of Internet identifier designed to solve the problem of how any web resource can have a persistent identity that never changes even when the web resource moves or changes its human-friendly name. For example, if a web page has an i-number, and links to that page use the i-number, then those links will not break even if the page is renamed, the website containing the page is completely reorganized, or the page is moved to another website.
Conceptually, an i-number is similar to an IP address, except i-numbers operate at a much higher level of abstraction in Internet addressing architecture. The other key difference is that i-numbers are persistent, i.e., once they are assigned to a resource, they are never reassigned. By contrast, IP addresses are constantly reassigned, e.g., your computer may have a different IP address every time it connects to the Internet.
Technically, an i-number is one form of an extensible resource identifier (XRI) — an abstract structured identifier standard developed at Organization for the Advancement of Structured Information Standards for sharing resources and data across domains and applications. The other form is called an i-name.
The i-number form of an XRI is designed to serve as an address that does not need to change no matter how often the location of a resource on (or off) the Internet changes. XRIs accomplish this by adding a third layer of abstract addressing over the existing layers: IP numbering (first layer) and DNS naming (second layer). The notion of a third layer for persistent addressing is not new — Uniform Resource Names (URNs) and other persistent identifier architectures have been developed for this purposes. However the XRI layer is the first architecture that combines a uniform syntax and resolution protocol for both persistent and reassignable identifiers.
At the XRI addressing layer, most resources will have both i-names and i-numbers. These different XRIs that all point to the same resource are called synonyms. I-name synonyms make it easy for humans to discover and address the resource, while i-number synonyms make it easy for machines to maintain a persistent identity for the resource. For example, if a company changes its name, it may register a new i-name and sell its old i-name to another company, however its i-number can remain the same — and links to the company that use its i-number won't break.
Furthermore, all of these forms of XRI synonyms can be resolved using the same http- or https-based resolution protocol. The results of XRI resolution are an XML document called an XRDS (Extensible Resource Descriptor Sequence). XRDS documents are the basis for the Yadis identity service discovery protocol that is now part of OpenID.
XRIs are also backwards compatible with the DNS and IP addressing systems, so it is possible for domain names and IP addresses to be used as i-names (or, in rare cases, as i-numbers). Like DNS names, XRIs can also be delegated, i.e., nested multiple levels deep, just like the directory names on a local computer file system. For example, a company can register a top-level (global) i-name and i-number for itself, and then assign second- or lower-level (community) i-names and i-numbers to its divisions, employees, etc.
Examples
The following examples conform to the i-number specifications published in the XDI.org Global Services Specifications. Note that they do not include the xri://'' prefix as this is optional with absolute XRIs.
Global I-Numbers
=!1000.a1b2.93d2.8c73 (Personal)
@!1000.9554.fabd.129c (Organizational)
!!1000 (Network — reserved for XDI.org-accredited i-brokers)
Community i-numbers (second-level)
=!1000.a1b2.93d2.8c73!3ae2 (Personal)
@!1000.9554.fabd.129c!2847.df3c (Organizational)
!!1000!de21.4536.2cb2.8074 (Network)
Community i-numbers (third-level)
=!1000.a1b2.93d2.8c73!3ae2!1490 (Personal)
@!1000.9554.fabd.129c!2847.df3c!cfae (Organizational)
!!1000!de21.4536.2cb2.8074!9fcd''' (Network)
See also
Global context registries
I-name
XRI (Extensible Resource Identifier)
XDI (XRI Data Interchange)
Social Web
Zooko's triangle
External links
OASIS XRI Technical Committee
OASIS XDI Technical Committee
XDI.org
XDI.org Global Services Specifications.
The Social Web: Creating An Open Social Network with XDI in the Planetwork Journal.
Identifiers
|
65794537
|
https://en.wikipedia.org/wiki/Roshan%20Dalvi
|
Roshan Dalvi
|
Roshan Dalvi is a former judge of the Bombay High Court, in Maharashtra, India. She adjudicated a number of widely reported and significant cases during her career as a judge, including the dispute between the children of Shiv Sena leader Bal Thackeray regarding their inheritance, and the challenge to a Maharashtra law forbidding dancers in bar from carrying on their profession.
Career
Dalvi practiced law in Mumbai and also taught corporate law, as a visiting faculty member at the Jamnalal Bajaj Institute of Management Studies and Narsee Monjee Institute of Management Studies.
In 1989, Dalvi was appointed as a judge in the City Civil and Sessions Court in Mumbai. In 2004, she was the principal judge of the Family Court in Mumbai. She was appointed to the Bombay High Court in June 2005.
Notable judgements
In 2006, Dalvi along with judge F. I. Rebello held that a law framed by the Maharashtra government to forbid dancers in bar from carrying on their profession was unconstitutional, and struck it down. Dalvi and Rebello, in a widely reported judgement, directed the state to ensure that minors were not involved in the profession, but apart from that, held that the government could not justify the prohibition on grounds of morality. Their ruling was upheld by the Indian Supreme Court, and an attempt to reintroduce the ban by subsequent legislation did not succeed.
In 2010, Dalvi held that parties could not appoint representatives to conduct their cases in Family Courts in Mumbai, holding that in the absence of qualifications or guidelines about such representatives, the courts would be "overrun by any number of unqualified, unenrolled persons".
In 2011, Dalvi was part of a bench of five judges that held that police officers were not required to give prior notice before freezing the bank accounts of persons being investigated, holding that principles of natural justice did not apply in this case.
In 2013, Dalvi held that both parents had an equal claim to guardianship of a child in the case of divorce, and that the default guardian was not necessarily the father. Also in the same year, Dalvi held in a significant ruling that complaints filed under the Domestic Violence Act can only be filed while the domestic relationship is ongoing, and not after it has ended.
In 2015, Dalvi convicted two persons of offences relating to fraud and corruption, in relation to the 1992 Indian stock market scam, and acquitted fourteen others. Following this conviction, several others, including Indian stockbroker, Harshad Mehta, also were convicted of related offences.
Dalvi has also adjudicated in a number of significant cases involving public figures, including the dispute between politician Uddhav Thackeray and his brother over property belonging to their father, the deceased Shiv Sena leader Bal Thackeray, a case concerning assault charges against Nikhil Daswani, the heir to the Charagh Din clothing brand, and a property dispute between industrialists and business men, G.L. Raheja and Nusli Wadia.
Corruption allegations
In 2015, film producer Sanjay Punamiya accused Dalvi of corruption during court proceedings regarding a property dispute involving Punamiya. Punamiya stated in court that he had met Dalvi's husband, Shamim Dalvi, who had promised him a favourable order in the case in exchange for Rs.2.5 million. In response, Dalvi ordered Punamiya and his legal representative to be taken into judicial custody for the offence of contempt of court. The Bombay Lawyers' Association made a representation to the Chief Justice of the Bombay High Court, protesting against Dalvi's order of detention. On 30 July 2015, Punamiya withdrew his complaint and offered an "unconditional apology" to Dalvi.
Judicial reforms
Following her retirement from judicial service, Dalvi has engaged in public consultations about judicial reforms in India.
In 2017, Dalvi was appointed as a member of a panel constituted by the Maharashtra government to address the trafficking and sexual exploitation of children in India The panel recommended prosecution guidelines in case of such offences, as well as the establishment of specially trained police units, and a helpline. Dalvi has also spoken publicly about the need for distinct legislation and improved judicial infrastructure to address human trafficking.
In 2019 she spoke at a judges' conclave on the need for better infrastructure in courts addressing crimes against children, noting that in Mumbai courts, the juvenile victim was often placed between two sets of wooden cupboards in the court in order to separate them from the accused offender.
Personal life
Dalvi earned a Bachelor of Commerce (B.Com) and a Master of Laws (LL.M) from Mumbai University. She was appointed as a Fellow of the Government Law College in Mumbai.
References
Year of birth missing (living people)
Living people
Judges of the Bombay High Court
20th-century Indian judges
21st-century Indian judges
University of Mumbai alumni
20th-century Indian women judges
21st-century Indian women judges
|
2001956
|
https://en.wikipedia.org/wiki/Computer-aided%20production%20engineering
|
Computer-aided production engineering
|
Computer-aided production engineering (CAPE) is a relatively new and significant branch of engineering. Global manufacturing has changed the environment in which goods are produced. Meanwhile, the rapid development of electronics and communication technologies has required design and manufacturing to keep pace.
Description of CAPE
CAPE is seen as a new type of computer-aided engineering environment which will improve the productivity of manufacturing/industrial engineers. This environment would be used by engineers to design and implement future manufacturing systems and subsystems. Work is currently underway at the United States National Institute of Standards and Technology (NIST) on CAPE systems. The NIST project is aimed at advancing the development of software environments and tools for the design and engineering of manufacturing systems.
CAPE and the Future of Manufacturing
The future of manufacturing will be determined by the efficiency with which it can incorporate new technologies. The current process in engineering manufacturing systems is often ad hoc, with computerized tools being used on a limited basis. Given the costs and resources involved in the construction and operation of manufacturing systems, the engineering process must be made more efficient. New computing environments for engineering manufacturing systems could help achieve that objective.
Why is CAPE important? In much the same way that product designers need computer-aided design systems, manufacturing and industrial engineers need sophisticated computing capabilities to solve complex problems and manage the vast data associated with the design of a manufacturing system.
In order to solve these complex problems and manage design data, computerized tools must be used in the application of scientific and engineering methods to the problem of the
design and implementation of manufacturing systems. Engineers must address the entire factory as a system and the interactions of that system with its surrounding environment.
Components of a factory system include:
the physical plant housing the manufacturing facility;
the production facilities which perform the manufacturing operations;
the technologies used in the production facility;
the work centers/stations, machinery, equipment, tools, and materials which comprise or are used by the production facilities;
the various support facilities;
the relationship between the factory and its environment.
CAPE must not only be concerned with the initial design and engineering of the factory, it must also address enhancements over time. CAPE should support standard engineering methods and problem-solving techniques, automate mundane tasks, and provide reference data to support the decision-making process.
The environment should be designed to help engineers become more productive and effective in their work. This would be implemented on personal computers or engineering workstations which have been configured with appropriate peripheral devices. Engineering tool developers will have to integrate the functions and data used by a number of different disciplines, for example:
manufacturing, industrial and plant engineering;
materials processing and quality engineering;
environmental engineering,
mathematical modeling/simulation, statistical process control and computer science,
economic and cost analysis and management science,
Many of the methods, formulas, and data associated with these technical areas currently exist only in engineering handbooks. Although some computerized tools are available, they are often very specialized, difficult to use, and do not share information or work together. Engineering tools built by different vendors must be made compatible through open systems architectures and interface standards.
What CAPE will look like
CAPE will be based upon computer systems providing an integrated set of design and engineering tools. These software tools will be used by a company's manufacturing engineers to continuously improve its production systems. They will maintain information about manufacturing resources, enhance production capabilities, and develop new facilities and systems. Engineers working on different workstations will share information through a common database.
Using CAPE, an engineering team will prepare detailed plans and working models for an entire factory in a matter of days. Alternative solutions to production problems could be quickly developed and evaluated. This would be a significant improvement over current manual methods which may require weeks or months of intensive activity.
To achieve this goal, a new set of engineering tools are needed. Examples of functions which should be supported include:
identification of product specifications and production requirements;
producibility analysis for products and modification of product designs to address manufacturability issues and management, scheduling and tracking of projects;
modeling and specification of manufacturing processes and plant layout and facilities planning;
consideration of various economic/cost tradeoffs of different manufacturing processes, systems, tools, and materials;
analysis supporting selection of systems/vendors and procurement of manufacturing equipment and support systems;
task and work place design;
compliance with various regulations, specifications, and standards, and control of hazardous materials.
The tools implementing these functions must be highly automated and integrated; and will need to provide quick access to a wide range of data. This data must be maintained in a format that is accessible and usable by the engineering tools. Some examples of the information that might be contained in these electronic libraries include:
production process models and data and generic manufacturing systems configurations;
machinery and equipment specifications, and vendor catalogs;
recommended methods, practices, algorithms, etc., and benchmarking data;
typical plant/system layouts,
cost estimation models, labor rates, other cost data and budget templates,
time standards, industrial standards, project plans, and laws/government regulations.
These on-line libraries would allow engineers to quickly develop solutions based upon the work of others.
Another critical aspect of this engineering environment is affordability, which
can best be achieved by designing an environment that can be constructed from low cost "off-the-shelf" commercial products, rather than custombuilt computer hardware and software. The basic engineering environment must be affordable. For both cost and technical reasons, it must be designed to be able to support incremental upgrades. Incremental upgrades would allow companies to add capabilities as they are needed. Commercial software products must be easy to install and integrate with other software already in use. These capabilities exist to a limited extent in some general purpose commercial software today, e.g., word processors, databases, spreadsheets.
Technical Concerns
Many technical issues must be considered in the design and development of new engineering tools for CAPE. These issues include:
required functionality of the tools themselves;
formalization and refinement of engineering methods;
development of on-line technical reference libraries, and user engineering and graphics visualization;
user engineering and graphics visualization techniques;
system connectivity and information sharing, and integration standards for the computing environment;
incorporation of intelligent behavior in the tools.
There are three critical elements to be addressed: creating a common manufacturing systems information model; using an engineering life cycle approach; and developing a software tool integration framework.
Resolution of these elements will help ensure that independently developed systems will be able to work together. The common information model should identify the elements of the manufacturing system and their relationships to each other; the functions or processes performed by each element; the tools, materials, and information required to perform those functions; and measures of effectiveness for the model and its component elements.
There have been many efforts over the years to develop information models for different
aspects of manufacturing, but no known existing model fully meets the needs of a CAPE ernviroment. Therefore, a life cycle approach is needed to identify the different processes that a CAPE environment must support, and must define all phases of a manufacturing system or subsystem's existence. Some of the major phases which may be included in a system life cycle approach are, requirements identification; system design specification; vendor selection; system development and upgrades; installation, testing, and training; and benchmarking of production operations.
Management, coordination, and administration functions need to be performed during each phase of the life cycle. Phases may be repeated over time as a system is upgraded or re-engineered to meet changing needs or incorporate new technologies.
A software tool integration framework should specify how the tools could be independently designed and developed. The framework would define how CAPE tools would deal with common services, interact with each other and coordinate problem solving activities. Although some existing software products and standards currently address the common services issue, the problem of tool interaction remains largely unsolved. The problem of tool interaction is not limited to the domain of computer-aided manufacturing systems engineering—it is pervasive across the software industry.
CAPE's current state
An initial CAPE environment has been established from commercial off-the-shelf (COTS) software packages. This new environment is being used to demonstrate commercially available tools to perform CAPE functions, to develop a better understanding and define functional requirements for individual engineering tools and the overall environment, and to identify the integration issues which must be addressed to implement compatible environments in the future.
Several engineering demonstrations using COTS tools are under development. These demonstrations are designed to illustrate the various types of functions that must be performed in engineering a manufacturing system.
Functions supported by the current COTS environment include: system specification/diagramming,
process flowcharting, information modeling, computer-aided design of products, plant layout, material flow analysis, ergonomic workplace design, mathematical modeling, statistical analysis, line balancing, manufacturing simulation, investment analysis, project management, knowledge-based system development, spreadsheets, document preparation, user interface development, document illustration, forms and database management.
Notes
CAPE
NIST Study
NIST Study
NIST Study
NIST Study
NIST Study
Sources
J.P. Tanner, Manufacturing Engineering: An Introduction to Basic Functions, Marcel Dekker, New York, 1991.
G. Salvendy (ed.), Handbook of Industrial Engineering, Wiley Interscience, New York, 1992.
D. Dallas (ed.), Tool and Manufacturing Engineers Handbook, McGraw-Hill, New York, 1976.
W.D Compton (ed.), Design and Analysis of Integrated Manufacturing Systems, National Academy Press, Washington, DC, 1988
Computer-aided design
Engineering disciplines
|
51101710
|
https://en.wikipedia.org/wiki/Uhuru%20Mobile
|
Uhuru Mobile
|
Uhuru Mobile is a secure Android-based operating system.
An operating system is the principal program allowing Smartphones, Tablets and PCs to run. This central tool connects and coordinates all the components such as kernel, computers programs, software or device drivers, letting users managing their devices.
Uhuru Mobile is a solution composed with its application encryption market, a modified Android-based OS, a virtual private network and a SMS encryption solution.
The purpose of Uhuru Mobile is to prevent physical attacks.
History
The name Uhuru comes from the Swahili language and means freedom and independence.
Uhuru Mobile is the result of a research and development project initiated in 2012 to promote digital sovereignty.
As an Android-based operating system, Uhuru Mobile focuses on security and privacy for end-users, individuals or businesses, on mobile devices.
The operating system is currently developed by a software Editor company called Teclib’.
System architecture
Software Overview
Multi-layers Protection
Kernel: The system core is protected against malicious or unknown code as well as physical attacks or access.
System protection: Critical resources are dynamically protected from malware and vulnerability exploits ensuring the integrity of the operating system’s components.
Data protection: User’s data on the device are encrypted. User’s authentication resources are protected by using certificates.
Application protection: The applications that can be installed on the device are exclusively coming from a market of certified applications. All those applications are validated and certificated before being available within the Uhuru applications market.
Additional Features
To ensure the OS protection and security while using applications, a dedicated market has been installed (replacing the Google Play Store). Uhuru Mobile’s applications market only provides apps approved and certified by a team of security experts. Companies can also customize the Uhuru marketplace providing their in-house applications.
Uhuru mobile is provided with a deception system, sending fake GPS location coordinates to applications. This decoy geolocation tool allows users to fool some applications using geolocation. IT administrators can define the redirecting coordinates. For example in the demo version, the NSA headquarters coordinates were sent by the deception system.
A mobile device management tool for the administration of mobile devices is provided without any additional setup. IT administrators have access to a web-console in order to manage the Uhuru Mobile fleet and all linked applications (such as the remote apps installation/suppression or the set up of user accounts).
See also
Operating system
Mobile device management
Security-focused operating system
References
External links
Teclib Edition/Uhuru Mobile
Uhuru Mobile
Bibliography
.
.
.
.
.
Mobile operating systems
|
11152113
|
https://en.wikipedia.org/wiki/Podes
|
Podes
|
Podes (Ancient Greek: Ποδής Podēs) was the son of Eetion in Greek mythology, and thus the brother of Andromache, wife of Hector, whom he is said to have befriended.
Traditional treatment
Podes fought on the side of the Trojans in the Trojan War, and was killed by Menelaus. However, in Book 6 of the Iliad, Andromache claims that her seven brothers have been killed by Achilles. This contradiction is not resolved.
Note
References
Homer, The Iliad with an English Translation by A.T. Murray, Ph.D. in two volumes. Cambridge, MA., Harvard University Press; London, William Heinemann, Ltd. 1924. . Online version at the Perseus Digital Library.
Homer, Homeri Opera in five volumes. Oxford, Oxford University Press. 1920. . Greek text available at the Perseus Digital Library.
People of the Trojan War
Characters in Greek mythology
|
42411345
|
https://en.wikipedia.org/wiki/Christine%20Darden
|
Christine Darden
|
Christine Darden (born September 10, 1942, as Christine Mann) is an American mathematician, data analyst, and aeronautical engineer who devoted much of her 40-year career in aerodynamics at NASA to researching supersonic flight and sonic booms. She had an M.S. in mathematics and had been teaching at Virginia State University before starting to work at the Langley Research Center in 1967. She earned a PhD in engineering at George Washington University in 1983 and has published numerous articles in her field. She was the first African-American woman at NASA's Langley Research Center to be promoted into the Senior Executive Service, the top rank in the federal civil service.
Darden is one of the researchers featured in the book Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race (2016), a history of some of the influential African-American women mathematicians and engineers at NASA in the mid-20th century, by Margot Lee Shetterly.
In 2019, Darden was awarded the Congressional Gold Medal.
Early life and career
Christine Mann was born September 10, 1942 to schoolteacher Desma l. Cheney and insurance agent Noah Horace Mann Sr. in Monroe, North Carolina. Both parents encouraged her to pursue a quality education. Starting from age three, Darden was brought by her mother to her own classroom where she taught, and at age four, Darden was enrolled in kindergarten. During elementary school, Darden took a great interest in breaking apart and reconstructing mechanical objects like her bicycle. Darden finished her last two years of primary school at Allen High School, a boarding school in Asheville, North Carolina.
She graduated as the class valedictorian in 1958, subsequently receiving a scholarship to attend Hampton University, a historically black college then known as Hampton Institute. During her studies at Hampton, she participated in some of the early protests of the Civil Rights Movement. She participated in several student sit-ins alongside her other Black peers. Mann graduated from Hampton with a B.S. in Mathematics in 1962. She also earned a teaching certification, and taught high school mathematics for a brief time.
In 1963, Mann married Walter L. Darden Jr., a middle-school science teacher. In 1965 she became a research assistant at Virginia State College, studying aerosol physics. At Virginia State, Darden earned an M.S. in 1967 and taught mathematics there.
That same year she was hired by NASA as a data analyst at Langley Research Center. Darden started in the "computer pool", performing calculations as a computer for engineers. She began automating the process by writing computer programs.
After moving into more aeronautical research, in 1973 Darden was promoted to a position as aerospace engineer by her superior John V. Becker. She had nearly been fired earlier. Her early findings in the 1960s and 1970s resulted in a revolution of aerodynamics design to produce low-boom sonic effects. In 1983 Darden earned a Ph.D in engineering from George Washington University.
In 1989, Darden was appointed as leader of the Sonic Boom Team, a subsidiary of the High Speed Research (HSR) Program. On the Sonic Boom Team she worked on designs to decrease the negative effects of sonic booms, such as noise pollution and the depletion of the ozone layer. Her team tested new wing and nose designs for supersonic aircraft. She also designed a computer program to simulate sonic booms.
The program was cancelled by the government in February 1998, "without fan fare or press announcement." A 1998 abstract published by Darden describes the program as focused on "technologies needed for the development of an environmentally friendly, economically viable High-Speed Civil Transport [HSCT]." Darden wrote more than 50 articles in the general field of aeronautical design, specializing in supersonic flow and flap design, as well as the prediction and minimization of sonic booms.
NASA's "human computers"
In 1935, the first African-American women mathematicians were hired as human computers at NASA (National Aeronautics and Space Administration), then known as NACA (National Advisory Committee for Aeronautics). Since many men were overseas fighting in World War II, more job opportunities were given to both white and African-American women. The latter computer pool became known as the "West Area Computers", in reference to their segregated office. The human computers performed calculations to support research into plane flight and, later, rockets. Because the state of Virginia, where the Langley Research Center was located, had racial segregation, Jim Crow laws were followed at the facility, which is located near Hampton. This changed after the 1964 Civil Rights Act which banned segregation.
The collective, once tasked with processing scores of collected flight test data, by the 1940s had garnered a reputation as "human computers" who were essential to NASA's operation. During the 1950s and 1960s, more of these women gained opportunities to advance as technicians and engineers.
Darden started working in the computer pool in 1967 at NASA, after she had completed an M.S. in mathematics at Virginia State University and taught there. By that time, computers were increasingly used for the complex calculations to support engineering and design. Darden left the computer pool in 1989 for a position as engineer, working on decreasing sonic boom in supersonic flight. She earned her PhD in 1983 (with the support of NASA), and became known for her research as "one of NASA's preeminent experts on supersonic flight and sonic booms." Darden was promoted as a manager, and she advanced to become the first African-American woman at Langley to be promoted into the Senior Executive Service, the top rank in the federal civil service.
In March 2007, Darden retired from NASA as director of the Office of Strategic Communication and Education.
Awards
In 1985, Darden received the Dr. A. T. Weathers Technical Achievement Award from the National Technical Association. She received a Candace Award from the National Coalition of 100 Black Women in 1987. She received three Certificates of Outstanding Performance from Langley Research Center: in 1989, 1991, and 1992.
On January 28, 2018, Darden received the Presidential Citizenship Award at Hampton University in recognition for her contribution and service".
Darden received an honorary degree from North Carolina State University on December 19, 2018.
Darden also received an honorary degree from the George Washington University on May 19, 2019.
In 2019, Darden was awarded the Congressional Gold Medal.
She delivered the Christine Darden Lecture at MathFest 2021.
References
External links
1942 births
Living people
People from Monroe, North Carolina
American women mathematicians
American aerospace engineers
George Washington University School of Engineering and Applied Science alumni
Virginia State University alumni
Hampton University alumni
NASA people
20th-century American mathematicians
West Area Computers
Mathematicians from North Carolina
20th-century women mathematicians
Mathematicians from Virginia
Congressional Gold Medal recipients
|
28013
|
https://en.wikipedia.org/wiki/Silicon%20Graphics
|
Silicon Graphics
|
Silicon Graphics, Inc. (stylized as SiliconGraphics before 1999, later rebranded SGI, historically known as Silicon Graphics Computer Systems or SGCS) was an American high-performance computing manufacturer, producing computer hardware and software. Founded in Mountain View, California in November 1981 by Jim Clark, its initial market was 3D graphics computer workstations, but its products, strategies and market positions developed significantly over time.
Early systems were based on the Geometry Engine that Clark and Marc Hannah had developed at Stanford University, and were derived from Clark's broader background in computer graphics. The Geometry Engine was the first very-large-scale integration (VLSI) implementation of a geometry pipeline, specialized hardware that accelerated the "inner-loop" geometric computations needed to display three-dimensional images. For much of its history, the company focused on 3D imaging and was a major supplier of both hardware and software in this market.
Silicon Graphics reincorporated as a Delaware corporation in January 1990. Through the mid to late-1990s, the rapidly improving performance of commodity Wintel machines began to erode SGI's stronghold in the 3D market. The porting of Maya to other platforms was a major event in this process. SGI made several attempts to address this, including a disastrous move from their existing MIPS platforms to the Intel Itanium, as well as introducing their own Linux-based Intel IA-32 based workstations and servers that failed in the market. In the mid-2000s the company repositioned itself as a supercomputer vendor, a move that also failed.
On April 1, 2009, SGI filed for Chapter 11 bankruptcy protection and announced that it would sell substantially all of its assets to Rackable Systems, a deal finalized on May 11, 2009, with Rackable assuming the name Silicon Graphics International. The remains of Silicon Graphics, Inc. became Graphics Properties Holdings, Inc.
History
Early years
James H. Clark left his position as an electrical engineering associate professor at Stanford University to found SGI in 1982 along with a group of seven graduate students and research staff from Stanford University: Kurt Akeley, David J. Brown, Tom Davis, Rocky Rhodes, Marc Hannah, Herb Kuta, and Mark Grossman; along with Abbey Silverstone and a few others.
Growth
Ed McCracken was CEO of Silicon Graphics from 1984 to 1997. During those years, SGI grew from annual revenues of $5.4 million to $3.7 billion.
Decline
The addition of 3D graphic capabilities to PCs, and the ability of clusters of Linux- and BSD-based PCs to take on many of the tasks of larger SGI servers, ate into SGI's core markets. The porting of Maya to Linux, Mac OS X and Microsoft Windows further eroded the low end of SGI's product line.
In response to challenges faced in the marketplace and a falling share price Ed McCracken was fired and SGI brought in Richard Belluzzo to replace him. Under Belluzzo's leadership a number of initiatives were taken which are considered to have accelerated the corporate decline.
One such initiative was trying to sell workstations running Windows NT called Visual Workstations in addition to workstations running IRIX, the company's version of UNIX. This put the company in even more direct competition with the likes of Dell, making it more difficult to justify a price premium. The product line was unsuccessful and abandoned a few years later.
SGI's premature announcement of its migration from MIPS to Itanium and its abortive ventures into IA-32 architecture systems (the Visual Workstation line, the ex-Intergraph Zx10 range and the SGI 1000-series Linux servers) damaged SGI's credibility in the market.
In 1999, in an attempt to clarify their current market position as more than a graphics company, Silicon Graphics Inc. changed its corporate identity to "SGI", although its legal name was unchanged.
At the same time, SGI announced a new logo consisting of only the letters "sgi" in a proprietary font called "SGI", created by branding and design consulting firm Landor Associates, in collaboration with designer Joe Stitzlein. SGI continued to use the "Silicon Graphics" name for its workstation product line, and later re-adopted the cube logo for some workstation models.
In November 2005, SGI announced that it had been delisted from the New York Stock Exchange because its common stock had fallen below the minimum share price for listing on the exchange. SGI's market capitalization dwindled from a peak of over seven billion dollars in 1995 to just $120 million at the time of delisting. In February 2006, SGI noted that it could run out of cash by the end of the year.
Re-emergence
In mid-2005, SGI hired Alix Partners to advise it on returning to profitability and received a new line of credit. SGI announced it was postponing its scheduled annual December stockholders meeting until March 2006. It proposed a reverse stock split to deal with the de-listing from the New York Stock Exchange.
In January 2006, SGI hired Dennis McKenna as its new CEO and chairman of the board of directors. Mr. McKenna succeeded Robert Bishop, who remained vice chairman of the board of directors.
On May 8, 2006, SGI announced that it had filed for Chapter 11 bankruptcy protection for itself and U.S. subsidiaries as part of a plan to reduce debt by $250 million. Two days later, the U.S. Bankruptcy Court approved its first day motions and its use of a $70 million financing facility provided by a group of its bondholders. Foreign subsidiaries were unaffected.
On September 6, 2006, SGI announced the end of development for the MIPS/IRIX line and the IRIX operating system. Production would end on December 29 and the last orders would be fulfilled by March 2007. Support for these products would end after December 2013.
SGI emerged from bankruptcy protection on October 17, 2006. Its stock symbol at that point, SGID.pk, was canceled, and new stock was issued on the NASDAQ exchange under the symbol SGIC. This new stock was distributed to the company's creditors, and the SGID common stockholders were left with worthless shares. At the end of that year, the company moved its headquarters from Mountain View to Sunnyvale. Its earlier North Shoreline headquarters is now occupied by the Computer History Museum; the newer Amphitheatre Parkway headquarters was sold to Google (which had already subleased and moved into the facility in 2003). Both of these locations were award-winning designs by Studios Architecture.
In April 2008, SGI re-entered the visualization market with the SGI Virtu range of visualization servers and workstations, which were re-badged systems from BOXX Technologies based on Intel Xeon or AMD Opteron processors and Nvidia Quadro graphics chipsets, running Red Hat Enterprise Linux, SUSE Linux Enterprise Server or Windows Compute Cluster Server.
Final bankruptcy and acquisition by Rackable Systems
In December 2008, SGI received a delisting notification from NASDAQ, as its market value had been below the minimum $35 million requirement for 10 consecutive trading days, and also did not meet NASDAQ's alternative requirements of a minimum stockholders' equity of $2.5 million or annual net income from continuing operations of $500,000 or more.
On April 1, 2009, SGI filed for Chapter 11 again, and announced that it would sell substantially all of its assets to Rackable Systems for $25 million. The sale, ultimately for $42.5 million, was finalized on May 11, 2009; at the same time, Rackable announced their adoption of "Silicon Graphics International" as their global name and brand. The Bankruptcy Court scheduled continuing proceedings and hearings for June 3 and 24, 2009, and July 22, 2009.
After the Rackable acquisition, Vizworld magazine published a series of six articles that chronicle the downfall of SGI.
Hewlett Packard Enterprise acquired Silicon Graphics International in November 2016, which allowed HPE to place the SGI Pleiades, a TOP500 supercomputer at NASA Ames Research Center, in its portfolio.
Graphics Properties Holdings, Inc. era
During Silicon Graphics Inc.'s second bankruptcy phase, it was renamed to Graphics Properties Holdings, Inc.(GPHI) in June 2009.
In 2010, GPHI announced it had won a significant favorable ruling in its litigation with ATI Technologies and AMD in June 2010, following the patent lawsuit originally filed during the Silicon Graphics, Inc. era. Following the 2008 appeal by ATI over the validity of ('327) and Silicon Graphics Inc's voluntary dismissal of the ('376) patent from the lawsuit, the Federal Circuit upheld the jury verdict on the validity of GPHI's U.S. Patent No. 6,650,327, and furthermore found that AMD had lost its right to challenge patent validity in future proceedings. On January 31, 2011, the District Court entered an order that permits AMD to pursue its invalidity affirmative defense at trial and does not permit SGI to accuse AMD's Radeon R700 series of graphics products of infringement in this case. On April 18, 2011, GPHI and AMD had entered into a confidential Settlement and License Agreement that resolved this litigation matter for an immaterial amount and that provides immunity under all GPHI patents for alleged infringement by AMD products, including components, software and designs. On April 26, 2011, the Court entered an order granting the parties' agreed motion for dismissal and final judgment.
In November 2011, GPHI filed another patent infringement lawsuit against Apple Inc. in Delaware involving more patents than their original patent infringement case against Apple last November, for alleged violation of U.S. patents 6,650,327 ('327), ('145) and ('881).
In 2012, GPHI filed lawsuit against Apple, Sony, HTC Corp, LG Electronics Inc. and Samsung Electronics Co., Research in Motion Ltd. for allegedly violating patent relating to a computer graphics process that turns text and images into pixels to be displayed on screens. Affected devices include Apple iPhone, HTC EVO4G, LG Thrill, Research in Motion Torch, Samsung Galaxy S and Galaxy S II, and Sony Xperia Play smartphones.
- 1998 Display system having floating point rasterization and floating point ..
- 2002 System, method, and computer program product for near-real time load ..
- 1998 Large area wide aspect ratio flat panel monitor having high resolution for ..
- 1995 Data processing system for processing one and two parcel instructions
Technology
Motorola 680x0-based systems
SGI's first generation products, starting with the IRIS (Integrated Raster Imaging System) 1000 series of high-performance graphics terminals, were based on the Motorola 68000 family of microprocessors. The later IRIS 2000 and 3000 models developed into full UNIX workstations.
IRIS 1000 series
The first entries in the 1000 series (models 1000 and 1200, introduced in 1984) were graphics terminals, peripherals to be connected to a general-purpose computer such as a Digital Equipment Corporation VAX, to provide graphical raster display abilities. They used 8 MHz Motorola 68000 CPUs with of RAM and had no disk drives. They booted over the network (via an Excelan EXOS/101 Ethernet card) from their controlling computer. They used the "PM1" CPU board, which was a variant of the board that was used in Stanford University's SUN workstation and later in the Sun-1 workstation from Sun Microsystems. The graphics system was composed of the GF1 frame buffer, the UC3 "Update Controller", DC3 "Display Controller", and the BP2 bitplane. The 1000-series machines were designed around the Multibus standard.
Later 1000-series machines, the 1400 and 1500, ran at 10 MHz and had 1.5 MB of RAM. The 1400 had a 73 MB ST-506 disk drive, while the 1500 had a 474 MB SMD-based disk drive with a Xylogics 450 disk controller. They may have used the PM2 CPU and PM2M1 RAM board from the 2000 series. The usual monitor for the 1000 series ran at 30 Hz interlaced. Six beta-test units of the 1400 workstation were produced, and the first production unit (SGI's first commercial computer) was shipped to Carnegie-Mellon University's Electronic Imaging Laboratory in 1984.
IRIS 2000 and 3000 series
SGI rapidly developed its machines into workstations with its second product line — the IRIS 2000 series, first released in August 1985. SGI began using the UNIX System V operating system. There were five models in two product ranges, the 2000/2200/2300/2400/2500 range which used 68010 CPUs (the PM2 CPU module), and the later "Turbo" systems, the 2300T, 2400T and 2500T, which had 68020s (the IP2 CPU module). All used the Excelan EXOS/201 Ethernet card, the same graphics hardware (GF2 Frame Buffer, UC4 Update Controller, DC4 Display Controller, BP3 Bitplane). Their main differences were the CPU, RAM, and Weitek Floating Point Accelerator boards, disk controllers and disk drives (both ST-506 and SMD were available). These could be upgraded, for example from a 2400 to a 2400T. The 2500 and 2500T had a larger chassis, a standard 6' 19" EIA rack with space at the bottom for two SMD disk drives weighing approximately each. The non-Turbo models used the Multibus for the CPU to communicate with the floating point accelerator, while the Turbos added a ribbon cable dedicated for this. 60 Hz monitors were used for the 2000 series.
The height of the machines using Motorola CPUs was reached with the IRIS 3000 series (models 3010/3020/3030 and 3110/3115/3120/3130, the 30s both being full-size rack machines). They used the same graphics subsystem and Ethernet as the 2000s, but could also use up to 12 "geometry engines", the first widespread use of hardware graphics accelerators. The standard monitor was a 19" 60 Hz non-interlaced unit with a tilt/swivel base; 19" 30 Hz interlaced and a 15" 60 Hz non-interlaced (with tilt/swivel base) were also available.
The IRIS 3130 and its smaller siblings were impressive for the time, being complete UNIX workstations. The 3130 was powerful enough to support a complete 3D animation and rendering package without mainframe support. With large capacity hard drives by standards of the day (two 300 MB drives), streaming tape and Ethernet, it could be the centerpiece of an animation operation.
The line was formally discontinued in November 1989, with about 3500 systems shipped of all 2000 and 3000 models combined.
RISC era
With the introduction of the IRIS 4D series, SGI switched to MIPS microprocessors. These machines were more powerful and came with powerful on-board floating-point capability. As 3D graphics became more popular in television and film during this time, these systems were responsible for establishing much of SGI's reputation.
SGI produced a broad range of MIPS-based workstations and servers during the 1990s, running SGI's version of UNIX System V, now called IRIX. These included the massive Onyx visualization systems, the size of refrigerators and capable of supporting up to 64 processors while managing up to three streams of high resolution, fully realized 3D graphics.
In October 1991, MIPS announced the first commercially available 64-bit microprocessor, the R4000. SGI used the R4000 in its Crimson workstation. IRIX 6.2 was the first fully 64-bit IRIX release, including 64-bit pointers.
To secure the supply of future generations of MIPS microprocessors (the 64-bit R4000), SGI acquired the company in 1992 for $333 million and renamed it as MIPS Technologies Inc., a wholly owned subsidiary of SGI.
In 1993, Silicon Graphics (SGI) signed a deal with Nintendo to develop the Reality Coprocessor (RCP) GPU used in the Nintendo 64 (N64) video game console. The deal was signed in early 1993, and it was later made public in August of that year. The console itself was later released in 1996. The RCP was developed by SGI's Nintendo Operations department, led by engineer Dr. Wei Yen. In 1997, twenty SGI employees, led by Yen, left SGI and founded ArtX (later acquired by ATI Technologies in 2000).
In 1998, SGI relinquished some ownership of MIPS Technologies, Inc in a Re-IPO, and fully divested itself in 2000.
In the late 1990s, when much of the industry expected the Itanium to replace both CISC and RISC architectures in non-embedded computers, SGI announced their intent to phase out MIPS in their systems. Development of new MIPS microprocessors stopped, and the existing R12000 design was extended multiple times until 2003 to provide existing customers more time to migrate to Itanium.
In August 2006, SGI announced the end of production for MIPS/IRIX systems, and by the end of the year MIPS/IRIX products were no longer generally available from SGI.
IRIS GL and OpenGL
Until the second generation Onyx Reality Engine machines, SGI offered access to its high performance 3D graphics subsystems through a proprietary API known as IRIS Graphics Language (IRIS GL). As more features were added over the years, IRIS GL became harder to maintain and more cumbersome to use. In 1992, SGI decided to clean up and reform IRIS GL and made the bold move of allowing the resulting OpenGL API to be cheaply licensed by SGI's competitors, and set up an industry-wide consortium to maintain the OpenGL standard (the OpenGL Architecture Review Board).
This meant that for the first time, fast, efficient, cross-platform graphics programs could be written. For over 20 years – until the introduction of the Vulkan API – OpenGL remained the only real-time 3D graphics standard to be portable across a variety of operating systems.
ACE Consortium
SGI was part of the Advanced Computing Environment initiative, formed in the early 1990s with 20 other companies, including Compaq, Digital Equipment Corporation, MIPS Computer Systems, Groupe Bull, Siemens, NEC, NeTpower, Microsoft and Santa Cruz Operation. Its intent was to introduce workstations based on the MIPS architecture and able to run Windows NT and SCO UNIX. The group produced the Advanced RISC Computing (ARC) specification, but began to unravel little more than a year after its formation.
Entertainment industry
For eight consecutive years (1995–2002), all films nominated for an Academy Award for Distinguished Achievement in Visual Effects were created on Silicon Graphics computer systems. the technology was also used in commercials for a host of companies.
An SGI Crimson system with the fsn three-dimensional file system navigator appeared in the 1993 movie Jurassic Park.
In the movie Twister, protagonists can be seen using an SGI laptop computer; however, the unit shown was not an actual working computer, but rather a fake laptop shell built around an SGI Corona LCD flat screen display.
The 1995 film Congo also features an SGI laptop computer being used by Dr. Ross (Laura Linney) to communicate via satellite to TraviCom HQ.
The purple, lowercased "sgi" logo can be seen at the beginning of the opening credits of the HBO series Silicon Valley, before being taken down and replaced by the Google logo as the intro graphics progress. Google leased the former SGI buildings in 2003 for their headquarters in Mountain View, CA until they purchased the buildings outright in 2006.
Once inexpensive PCs began to have graphics performance close to the more expensive specialized graphical workstations which were SGI's core business, SGI shifted its focus to high performance servers for digital video and the Web. Many SGI graphics engineers left to work at other computer graphics companies such as ATI and Nvidia, contributing to the PC 3D graphics revolution.
Free software
SGI was a promoter of free software, supporting several projects such as Linux and Samba, and opening some of its own previously proprietary code such as the XFS filesystem and the Open64 compiler.
SGI was also important in its contribution to the C++ Standard Template Library (STL) with many useful extensions in the MIT-like licensed SGI STL implementation. The extension keeps being carried by the direct descendant STLport and GNU's libstdc++.
Acquisition of Alias, Wavefront, Cray and Intergraph
In 1995, SGI purchased Alias Research, Kroyer Films, and Wavefront Technologies in a deal totaling approximately $500 million and merged the companies into Alias|Wavefront. In June 2004 SGI sold the business, later renamed to Alias/Wavefront, to the private equity investment firm Accel-KKR for $57.1 million. In October 2005, Autodesk announced that it signed a definitive agreement to acquire Alias for $182 million in cash.
In February 1996, SGI purchased the well-known supercomputer manufacturer Cray Research for $740 million, and began to use marketing names such as "CrayLink" for (SGI-developed) technology integrated into the SGI server line. Three months later, it sold the Cray Business Systems Division, responsible for the CS6400 SPARC/Solaris server, to Sun Microsystems for an undisclosed amount (acknowledged later by a Sun executive to be "significantly less than $100 million"). Many of the Cray T3E engineers designed and developed the SGI Altix and NUMAlink technology. SGI sold the Cray brand and product lines to Tera Computer Company on March 31, 2000, for $35 million plus one million shares. SGI also distributed its remaining interest in MIPS Technologies through a spin-off effective June 20, 2000.
In September 2000, SGI acquired the Zx10 series of Windows workstations and servers from Intergraph Computer Systems (for a rumored $100 million), and rebadged them as SGI systems. The product line was discontinued in June 2001.
SGI Visual Workstations
Another attempt by SGI in the late 1990s to introduce its own family of Intel-based workstations running Windows NT or Red Hat Linux (see also SGI Visual Workstation) proved to be a financial disaster, and shook customer confidence in SGI's commitment to its own MIPS-based line.
Switch to Itanium
In 1998, SGI announced that future generations of its machines would be based not on their own MIPS processors, but the upcoming "super-chip" from Intel, code-named "Merced" and later called Itanium. Funding for its own high-end processors was reduced, and it was planned that the R10000 would be the last MIPS mainstream processor. MIPS Technologies would focus entirely on the embedded market, where it was having some success, and SGI would no longer have to fund development of a CPU that, since the failure of ARC, found use only in their own machines. This plan quickly went awry. As early as 1999 it was clear the Itanium was going to be delivered very late and would have nowhere near the performance originally expected. As the production delays increased, MIPS' existing R10000-based machines grew increasingly uncompetitive. Eventually it was forced to introduce faster MIPS processors, the R12000, R14000 and R16000, which were used in a series of models from 1999 through 2006.
SGI's first Itanium-based system was the short-lived SGI 750 workstation, launched in 2001. SGI's MIPS-based systems were not to be superseded until the launch of the Itanium 2-based Altix servers and Prism workstations some time later. Unlike the MIPS systems, which ran IRIX, the Itanium systems used SuSE Linux Enterprise Server with SGI enhancements as their operating system. SGI used Transitive Corporation's QuickTransit software to allow their old MIPS/IRIX applications to run (in emulation) on the new Itanium/Linux platform.
In the server market the Itanium 2-based Altix eventually replaced the MIPS-based Origin product line. In the workstation market, the switch to Itanium was not completed before SGI exited the market.
The Altix was the most powerful computer in the world in 2006, assuming that a "computer" is defined as a collection of hardware running under a single instance of an operating system. The Altix had 512 Itanium processors running under a single instance of Linux. A cluster of 20 machines was then the eighth-fastest supercomputer. All faster supercomputers were clusters, but none have as many FLOPS per machine. However, more recent supercomputers are very large clusters of machines that are individually less capable. SGI acknowledged this and in 2007 moved away from the "massive NUMA" model to clusters.
Switch to Xeon
Although SGI continued to market Itanium-based machines, its more recent machines were based on the Intel Xeon processor. The first Altix XE systems were relatively low-end machines, but by December 2006 the XE systems were more capable than the Itanium machines by some measures (e.g., power consumption in FLOPS/W, density in FLOPS/m3, cost/FLOPS). The XE1200 and XE1300 servers used a cluster architecture. This was a departure from the pure NUMA architectures of the earlier Itanium and MIPS servers.
In June 2007, SGI announced the Altix ICE 8200, a blade-based Xeon system with up to 512 Xeon cores per rack. An Altix ICE 8200 installed at New Mexico Computing Applications Center (with 14336 processors) ranked at number 3 on the TOP500 list of November 2007.
User base and core market
Conventional wisdom holds that SGI's core market has traditionally been Hollywood visual effects studios. In fact, SGI's largest revenue has always been generated by government and defense applications, energy, and scientific and technical computing. In one case Silicon Graphics' largest single sale ever was to the United States Postal Service. SGI's servers powered an artificial intelligence program to mechanically read, tag and sort the mail (hand-written and block) at a number of USPS's key mail centers. The rise of cheap yet powerful commodity workstations running Linux, Windows and Mac OS X, and the availability of diverse professional software for them, effectively pushed SGI out of the visual effects industry in all but the most niche markets.
High-end server market
SGI continued to enhance its line of servers (including some supercomputers) based on the SN architecture. SN, for Scalable Node, is a technology developed by SGI in the mid-1990s that uses cache-coherent non-uniform memory access (cc-NUMA). In an SN system, processors, memory, and a bus- and memory-controller are coupled together into an entity called a node, usually on a single circuit board. Nodes are connected by a high-speed interconnect called NUMAlink (originally marketed as CrayLink). There is no internal bus, and instead access between processors, memory, and I/O devices is done through a switched fabric of links and routers.
Thanks to the cache coherence of the distributed shared memory, SN systems scale along several axes at once: as CPU count increases, so does memory capacity, I/O capacity, and system bisection bandwidth. This allows the combined memory of all the nodes to be accessed under a single OS image using standard shared-memory synchronization methods. This makes an SN system far easier to program and able to achieve higher sustained-to-peak performance than non-cache-coherent systems like conventional clusters or massively parallel computers which require applications code to be written (or re-written) to do explicit message-passing communication between their nodes.
The first SN system, known as SN-0, was released in 1996 under the product name Origin 2000. Based on the MIPS R10000 processor, it scaled from 2 to 128 processors and a smaller version, the Origin 200 (SN-00), scaled from 1 to 4. Later enhancements enabled systems of as large as 512 processors.
The second generation system, originally called SN-1 but later SN-MIPS, was released in July 2000, as the Origin 3000. It scaled from 4 to 512 processors, and 1,024-processor configurations were delivered by special order to some customers. A smaller, less scalable implementation followed, called Origin 300.
In November 2002, SGI announced a repackaging of its SN system, under the name Origin 3900. It quadrupled the processor area density of the SN-MIPS system, from 32 up to 128 processors per rack while moving to a "fat tree" interconnect topology.
In January 2003, SGI announced a variant of the SN platform called the Altix 3000 (internally called SN-IA). It used Intel Itanium 2 processors and ran the Linux operating system kernel. At the time it was released, it was the world's most scalable Linux-based computer, supporting up to 64 processors in a single system node. Nodes could be connected using the same NUMAlink technology to form what SGI predictably termed "superclusters".
In February 2004, SGI announced general support for 128 processor nodes to be followed by 256 and 512 processor versions that year.
In April 2004, SGI announced the sale of its Alias software business for approximately $57 million.
In October 2004, SGI built the supercomputer Columbia, which broke the world record for computer speed, for the NASA Ames Research Center. It was a cluster of 20 Altix supercomputers each with 512 Intel Itanium 2 processors running Linux, and achieved sustained speed of 42.7 trillion floating-point operations per second (teraflops), easily topping Japan's famed Earth Simulator's record of 35.86 teraflops. (A week later, IBM's upgraded Blue Gene/L clocked in at 70.7 teraflops.)
In July 2006, SGI announced an SGI Altix 4700 system with 1,024 processors and 4 TB of memory running a single Linux system image.
Hardware products
Some 68k and MIPS-based models were also rebadged by other vendors, including CDC, Tandem Computers, Prime Computer and Siemens-Nixdorf.
SGI Onyx and SGI Indy series systems were used for game development for the Nintendo 64.
Motorola 68k-based systems
IRIS 1000 series graphics terminals (diskless 1000/1200, 1400/1500 with disks)
IRIS 2000 series workstations (2000/2200/2300/2400/2500 non-Turbo and 2300T/2400T/2500T "Turbo" models)
IRIS 3000 series workstations (3010/3020/3030 and 3110/3115/3120/3130)
MIPS-based systems
Workstations
Professional IRIS series (IRIS 4D/50/60/70/80/85)
Personal IRIS series (IRIS 4D/20/25/30/35)
IRIS Power Series (IRIS 4D/1x0/2x0/3x0/4x0)
IRIS Crimson (deskside workstation/server)
IRIS Indigo series (Indigo, Indigo R4000)
Indigo² series (Indigo², Power Indigo², Indigo² R10000)
Indy workstation
O2/O2+ workstation
Octane workstation
Octane2 workstation
Fuel entry-level workstation
Tezro high-end workstation
Servers
Challenge S (desktop server)
Challenge M/Power Challenge M (desktop server)
Challenge DM (deskside server)
Challenge L/Power Challenge/Challenge 10000 (deskside server)
Challenge XL/Power Challenge XL (rack server)
Origin 200 entry-level server
Origin 2000 high-end server
Origin 300 entry-level server
Origin 350 mid-range server
Origin 3000 high-end server
Visualization
Onyx (deskside and rackmount systems)
Power Onyx (deskside and rackmount systems)
Onyx 10000 (deskside and rackmount systems)
Onyx2 (deskside and rackmount systems)
Onyx 350 (rackmount systems)
Onyx 3000 (rackmount systems)
Onyx4 (rackmount systems)
SkyWriter (rackmount systems)
Intel IA-32-based systems
Workstations
SGI 320 Visual Workstation (Windows NT)
SGI 540 Visual Workstation (Windows NT)
SGI 230 Workstation (Linux/Windows NT)
SGI 330 Workstation (Linux/Windows NT)
SGI 550 Workstation (Linux/Windows NT)
SGI Zx10 Visual Workstation (Windows)
SGI Zx10 VE Visual Workstation (Windows)
Servers
SGI Zx10 Server (Windows)
SGI 1100 server (Linux/Windows)
SGI 1200 server (Linux/Windows)
SGI 1400 server (Linux/Windows)
SGI 1450 server (Linux/Windows)
SGI Internet Server (Linux)
SGI Internet Server for E-commerce (Linux)
SGI Internet Server for Messaging (Linux)
Itanium-based systems
SGI 750 workstation
Altix 330 entry-level server
Altix 350 mid-range server
Altix 3000 high-end server
Altix 450 mid-range server
Altix 4000 high-end server, capable of up to 2048 CPUs
Prism (deskside and rackmount systems)
Intel/AMD x86-64 systems
Altix XE210 server
Altix XE240 server
Altix XE310 server
Altix XE1200 cluster
Altix XE1300 cluster
Altix ICE 8200
Altix ICE 8400
Virtu VN200 visualization node
Virtu VS100 workstation
Virtu VS200 workstation
Virtu VS300 workstation
Virtu VS350 workstation
FPGA-based accelerators
RASC Application Acceleration
Storage systems
InfiniteStorage 10000
InfiniteStorage 6700
InfiniteStorage 4600
InfiniteStorage 4500
InfiniteStorage 4000
InfiniteStorage 350
InfiniteStorage 220
InfiniteStorage 120
SGI Infinite Data Cluster
Storage solutions
InfiniteStorage NEXIS 500
InfiniteStorage NEXIS 2000
InfiniteStorage NEXIS 7000
InfiniteStorage NEXIS 7000-HA
InfiniteStorage NEXIS 9000
InfiniteStorage Server 3500
Displays
1600SW, a multi-award-winning wide screen video monitor
Accelerator cards
IrisVision, one of the first 3D graphics accelerators for high-end PCs
See also
SCO and SGI
Rick Belluzzo, SGI CEO from January 1998 to August 1999
Silicon Graphics Image
References
External links
Whatever Happened to SGI?
SGI timeline
Irix Network - information, forums, and archive for SGI machines
Nekochan SGI wiki
IRIS 2000/3000 FAQ
A collection of SGI equipment images
Silicon Graphics User Group
1981 establishments in California
2009 disestablishments in California
American companies established in 1981
Defunct computer companies based in California
Companies based in Mountain View, California
Companies based in Silicon Valley
Companies based in Sunnyvale, California
Companies formerly listed on the New York Stock Exchange
Companies that filed for Chapter 11 bankruptcy in 2006
Companies that filed for Chapter 11 bankruptcy in 2009
Computer companies established in 1981
Defunct companies based in the San Francisco Bay Area
Defunct computer hardware companies
Defunct semiconductor companies of the United States
Defunct software companies of the United States
Design companies established in 1981
Electronics companies established in 1981
Electronics companies of the United States
Graphics hardware companies
Technology companies based in the San Francisco Bay Area
Technology companies disestablished in 2009
Technology companies established in 1981
|
5583861
|
https://en.wikipedia.org/wiki/Refined%20Printing%20Command%20Stream
|
Refined Printing Command Stream
|
Refined Printing Command Stream, also known as RPCS, is a vector-based printing/duplicating control protocol, designed for communication between Microsoft Windows PC clients, and several lines of Ricoh copiers. Drivers provided by Ricoh install the chosen copier to behave as a printer device.
The size-efficiency of the protocol is comparable to PCL6.
Drivers
Ricoh offers RPCS based drivers for Windows, Mac OS and to some extent for Linux.
Linux
Drivers for Linux are provided only on the Japanese website. Instead of Aficio they are called IPSiO.
See also
Ricoh Hong Kong
PCL - Printer Command Language, a printer control protocol family designed by Hewlett-Packard
References
Further reading
A tutorial about installing the Ricoh RPCS driver on Linux
Page description languages
|
15154
|
https://en.wikipedia.org/wiki/IBM%203270
|
IBM 3270
|
The IBM 3270 is a family of block oriented display and printer computer terminals introduced by IBM in 1971 and normally used to communicate with IBM mainframes. The 3270 was the successor to the IBM 2260 display terminal. Due to the text color on the original models, these terminals are informally known as green screen terminals. Unlike a character-oriented terminal, the 3270 minimizes the number of I/O interrupts required by transferring large blocks of data known as data streams, and uses a high speed proprietary communications interface, using coaxial cable.
IBM no longer manufactures 3270 terminals, but the IBM 3270 protocol is still commonly used via TN3270 clients, 3270 terminal emulation or web interfaces to access mainframe-based applications, which are sometimes referred to as green screen applications.
Principles
The 3270 series was designed to connect with mainframe computers, often at a remote location, using the technology then available in the early 1970s. The main goal of the system was to maximize the number of terminals that could be used on a single mainframe. To do this, the 3270 was designed to minimize the amount of data transmitted, and minimize the frequency of interrupts to the mainframe. By ensuring the CPU is not interrupted at every keystroke, a 1970s-era IBM 3033 mainframe fitted with only 16 MB of main memory was able to support up to 17,500 3270 terminals under CICS.
Most 3270 devices are clustered, with one or more displays or printers connected to a control unit (the 3275 and 3276 included an integrated control unit). Originally devices were connected to the control unit over coaxial cable; later Token Ring, twisted pair, or Ethernet connections were available. A local control unit attaches directly to the channel of a nearby mainframe. A remote control unit is connected to a communications line by a modem. Remote 3270 controllers are frequently multi-dropped, with multiple control units on a line.
IBM 3270 devices are connected to a 3299 multiplexer or to the cluster controller, e.g., 3271, 3272, 3274, 3174, using RG-62, 93 ohm, coax cables in a point to point configuration with one dedicated cable per terminal. Data is sent with a bit rate of 2.3587 Mbit/s using a slightly modified differential Manchester encoding. Cable runs of up to are supported, although IBM documents routinely stated the maximum supported coax cable length was . Originally devices were equipped with BNC connectors, which later was replaced with special so-called DPC – Dual Purpose Connectors supporting the IBM Shielded twisted pair cabling system without the need for so-called red baluns.
In a data stream, both text and control (or formatting functions) are interspersed allowing an entire screen to be painted as a single output operation. The concept of formatting in these devices allows the screen to be divided into fields (clusters of contiguous character cells) for which numerous field attributes, e.g., color, highlighting, character set, protection from modification, can be set. A field attribute occupies a physical location on the screen that also determines the beginning and end of a field. There are also character attributes associated with individual screen locations.
Using a technique known as read modified, a single transmission back to the mainframe can contain the changes from any number of formatted fields that have been modified, but without sending any unmodified fields or static data. This technique enhances the terminal throughput of the CPU, and minimizes the data transmitted. Some users familiar with character interrupt-driven terminal interfaces find this technique unusual. There is also a read buffer capability that transfers the entire content of the 3270-screen buffer including field attributes. This is mainly used for debugging purposes to preserve the application program screen contents while replacing it, temporarily, with debugging information.
Early 3270s offered three types of keyboards. The typewriter keyboard came in both a 66 key version, with no programmed function (PF) keys, and a 78 key version with twelve. Both versions had two Program Attention (PA) keys. The data entry keyboard had five PF keys and two PA keys. The operator console keyboard had twelve PF keys and two PA keys. Later 3270s had an Attention key, a Cursor Select key, a System Request key, twenty-four PF keys and three PA keys. There was also a TEST REQ key. When one of these keys is pressed, it will cause its control unit to generate an I/O interrupt to the host computer and present an Attention ID (AID) identifying which key was pressed. Application program functions such as termination, page-up, page-down, or help can be invoked by a single key press, thereby reducing the load on very busy processors.
A downside to this approach was that vi-like behavior, responding to individual keystrokes, was not possible. For the same reason, a port of Lotus 1-2-3 to mainframes with 3279 screens did not meet with success because its programmers were not able to properly adapt the spreadsheet's user interface to a screen at a time rather than character at a time device. But end-user responsiveness was arguably more predictable with 3270, something users appreciated.
Applications
Following its introduction the 3270 and compatibles were by far the most commonly used terminals on IBM System/370 and successor systems. IBM and third-party software that included an interactive component took for granted the presence of 3270 terminals and provided a set of ISPF panels and supporting programs.
Conversational Monitor System (CMS) in VM has support for the 3270 continuing to z/VM.
Time Sharing Option (TSO) in OS/360 and successors has line mode command line support and also has facilities for full screen applications, e.g., ISPF.
Device independent Display Operator Console Support (DIDOCS) in Multiple Console Support (MCS) for OS/360 and successors.
The SPF and Program Development Facility (ISPF/PDF) editors for MVS and VM/SP (ISPF/PDF was available for VM, but little used) and the XEDIT editors for VM/SP through z/VM make extensive use of 3270 features.
Customer Information Control System (CICS) has support for 3270 panels.
Various versions of Wylbur have support for 3270, including support for full-screen applications.
The modified data tag is well suited to converting formatted, structured punched card input onto the 3270 display device. With the appropriate programming, any batch program that uses formatted, structured card input can be layered onto a 3270 terminal.
IBM's OfficeVision office productivity software enjoyed great success with 3270 interaction because of its design understanding. And for many years the PROFS calendar was the most commonly displayed screen on office terminals around the world.
A version of the WordPerfect word processor ported to System/370 was designed for the 3270 architecture.
SNA
3270 devices can be a part of an SNA – System Network Architecture network or non-SNA network. If the controllers are SNA connected, they appear to SNA as PU – Physical Unit type 2.0 (PU2.1 for APPN) nodes typically with LU – Logical Unit type 1, 2, and 3 devices connected. Local, channel attached, controllers are controlled by VTAM – Virtual Telecommunications Access Method. Remote controllers are controlled by the NCP – Network Control Program in the Front End Processor i.e. 3705, 3720, 3725, 3745, and VTAM.
Third parties
One of the first groups to write and provide operating system support for the 3270 and its early predecessors was the University of Michigan, who created the Michigan Terminal System in order for the hardware to be useful outside of the manufacturer. MTS was the default OS at Michigan for many years, and was still used at Michigan well into the 1990s.
Many manufacturers, such as GTE, Hewlett Packard, Honeywell/Incoterm Div, Memorex, ITT Courier, McData, Harris, Alfaskop and Teletype/AT&T created 3270 compatible terminals, or adapted ASCII terminals such as the HP 2640 series to have a similar block-mode capability that would transmit a screen at a time, with some form validation capability. The industry distinguished between ‘System compatible controllers’ and ‘Plug compatibility controllers’, where ‘System compatibility’ meant that the 3rd party system was compatible with the 3270 data stream terminated in the unit, but not as ‘Plug compatibility’ equipment, also were compatible at the coax level thereby allowing IBM terminals to be connected to a 3rd party controller or vice versa. Modern applications are sometimes built upon legacy 3270 applications, using software utilities to capture (screen scraping) screens and transfer the data to web pages or GUI interfaces.
In the early 1990s a popular solution to link PCs with the mainframes was the Irma board, an expansion card that plugged into a PC and connected to the controller through a coaxial cable. 3270 simulators for IRMA and similar adapters typically provide file transfers between the PC and the mainframe using the same protocol as the IBM 3270 PC.
Models
The IBM 3270 display terminal subsystem consists of displays, printers and controllers.
Optional features for the 3275 and 3277 are the selector-pen, ASCII rather than EBCDIC character set, an audible alarm, and a keylock for the keyboard. A keyboard numeric lock was available and will lock the keyboard if the operator attempts to enter non-numeric data into a field defined as numeric. Later an Operator Identification Card Reader was added which could read information encoded on a magnetic stripe card.
Displays
Generally, 3277 models allow only upper-case input, except for the mixed EBCDIC/APL or text keyboards, which have lower case. Lower-case capability and dead keys were available as an RPQ (Request Price Quotation); these were added to the later 3278 & 3279 models.
A version of the IBM PC called the 3270 PC, released in October 1983, includes 3270 terminal emulation. Later, the 3270 PC/G (graphics), 3270 PC/GX (extended graphics), 3270 Personal Computer AT, 3270 PC AT/G (graphics) and 3270 PC AT/GX (extended graphics) followed.
CUT vs. DFT
There are two types of 3270 displays in respect to where the 3270 data stream terminates. For CUT (Control Unit Terminal) displays, the stream terminates in the display controller, the controller instructs the display to move the cursor, position a character, etc. EBCDIC is translated by the controller into ‘3270 Character Set’, and keyboard scan-codes from the terminal, read by the controller through a poll, is translated by the controller into EBCDIC. For DFT (Distributed Function Terminal) type displays, most of the 3270 data stream is forwarded to the display by the controller. The display interprets the 3270 protocol itself.
In addition to passing the 3270 data stream directly to the terminal, allowing for features like EAB - Extended Attributes, Graphics, etc., DFT also enabled multi sessions (up to 5 simultaneous), featured in the 3290 and 3194 multisession displays. This feature was also widely used in 2nd generation 3270 terminal emulation software.
The MLT - Multiple Logical Terminals feature of the 3174 controller also enabled multiple sessions from a CUT type terminal.
3277
3277 model 1: 40×12 terminal
3277 model 2: 80×24 terminal, the biggest success of all
3277 GA: a 3277 with an RS232C I/O, often used to drive a Tektronix 4013 or 4015 graphic screen (monochrome)
3278
3278 models 1–5: next-generation, with accented characters and dead keys in countries that needed them
model 1: 80x12
model 2: 80×24
model 2A: 80x24 (console) with 4 lines reserved
model 3: 80×32 or 80x24 (switchable)
model 4: 80×43 or 80x24 (switchable)
model 5: 132×27 or 80×24 (switchable)
3278 PS: programmable characters; able to display monochrome graphics
3279
The IBM 3279 was IBM's first color terminal. IBM initially announced four models, and later added a fifth model for use as a processor console.
Models
model 2A: 80-24 base color
model 2B: 80-24 extended color
model 2C: 80-24 base color (console) with 4 lines reserved
model 3A: 80-32 base color
model 3B: 80-32 extended color
Base colorIn base color mode the protection and intensity field attributes determine the color:
{| class="wikitable"
|+ Base color mode
|-
| Protection
| Intensity
| Color
|-
| Unprotected
| Normal
| Green
|-
| Unprotected
| Intensified
| Red
|-
| Protected
| Normal
| Blue
|-
| Protected
| Intensified
| White
|}
Extended colorIn extended color mode the color field and character attributes determine the color as one of
Neutral (White)
Red
Blue
Green
Pink
Yellow
Turquoise
The 3279 was introduced in 1979. The 3279 was widely used as an IBM mainframe terminal before PCs became commonly used for the purpose. It was part of the 3270 series, using the 3270 data stream. Terminals could be connected to a 3274 controller, either channel connected to an IBM mainframe or linked via an SDLC (Synchronous Data Link Control) link. In the Systems Network Architecture (SNA) protocol these terminals were logical unit type 2 (LU2). The basic models 2A and 3A used red, green for input fields, and blue and white for output fields. However, the models 2B and 3B supported seven colors, and when equipped with the optional Programmed Symbol Set feature had a loadable character set that could be used to show graphics.
The IBM 3279 with its graphics software support, Graphical Data Display Manager (GDDM), was designed at IBM's Hursley Development Laboratory, near Winchester, England.
3290
The 3290 Information Panel a 17", amber monochrome plasma display unit announced March 8, 1983, capable of displaying in various modes, including four independent 3278 model 2 terminals, or a single 160×62 terminal; it also supports partitioning. The 3290 supports graphics through the use of programmed symbols. A 3290 application can divide its screen area up into as many as 16 separate explicit partitions (logical screens).
The 3290 is a Distributed Function Terminal (DFT) and requires that the controller do a downstream load (DSL) of microcode from floppy or hard disk.
317x
3178: lower cost terminal (1983)
3179: low cost color terminal announced March 20, 1984.
3180
The 3180 was a monochrome display, introduced on March 20, 1984, that the user could configure for several different basic and extended display modes; all of the basic modes have a primary screen size of 24x80. Modes 2 and 2+ have a secondary size of 24x80, 3 and 3+ have a secondary size of 32x80, 4 and 4+ have a secondary size of 43x80 and 5 and 5+ have a secondary size of 27x132. An application can override the primary and alternate screen sizes for the extended mode. The 3180 also supported a single explicit partition that could be reconfigured under application control.
3191
The IBM 3191 Display Station is an economical monochrome CRT. Models A and B are 1920 characters 12-inch CRTs. Models D, E and L are 1920 or 2560 character 14-inch CRTs.
3192
Model C provides a 7-color 14 inch CRT with 80x24 or 80x32 characters
Model D provides a green monochrome 15 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters
Model F provides a 7-color high-resolution 14 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters
Model G provides a 7-color 14 inch CRT with 80x24 or 80x32 characters
Model L provides a green monochrome 15 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters with a selector pen capability
Model W provides a black and while 15 inch CRT with 80x24, 80x32, 80x44 or 132x27 characters
3193
The IBM 3193 Display Station is a high-resolution, portrait-type, monochrome, 380mm (15 inch) CRT image display providing up to letter or A4 size document display capabilities in addition to alphanumeric data.
Compressed images can be sent to the 3193 from a scanner and decompression is performed in the 3193.
Image data compression is a technique to save transmission time and reduce storage requirements.
3194
The IBM 3194 is a Display Station that features a 1.44MB 3.5" floppy drive and IND$FILE transfer.
Model C provides a 12-inch color CRT with 80x24 or 80x32 characters
Model D provides a 15-inch monochrome CRT with 80x24, 80x31, 80x44 or 132x27 characters
Model H provides a 14-inch color CRT with 80x24, 80x31, 80x44 or 132x27 characters
Subsequent
3104: low-cost R-loop connected terminal for the IBM 8100 system
3472 Infowindow
Non-IBM Displays
Several third-party manufacturers produced 3270 displays besides IBM.
GTE
GTE manufactured the IS/7800 Video Display System, nominally compatible with IBM 3277 displays attached to a 3271 or 3272. An incompatibility with the RA buffer order broke the logon screen in VM/SE (SEPP).
Harris
Harris manufactured the 8000 Series Terminal Systems, compatible with IBM 3277 displays attached to a 3271 or 3272.
Harris later manufactured the 9100–9200 Information Processing Systems, which included
9178
9278
9279-2A
9279-3G
9280
Informer 270 376/SNA
The Informer company manufactured a special version of their model 270 terminal that was compatible with IBM 3270 and its associated coax port to connect to a 3x74.
Memorex Telex
Memorex 1377, compatible with IBM 3277Attaches to 1371 or 1372
Documentation for the following is available at
Memorex/Telex 2078
Memorex/Telex 2079
Memorex/Telex 2080
Memorex/Telex 2178
Memorex/Telex 2179
Nokia/Alfaskop
Alfaskop Display Unit 4110
Alfaskop Display Unit 4112
AT&T
AT&T introduced the Dataspeed 40 terminal/controller, compatible with the IBM 3275, in 1980.
Graphics models
IBM had two different implementations for supporting graphics. The first was implemented in the optional Programmed Symbol Sets (PSS) of the 3278, 3279 and 3287, which became a standard feature on the later 3279-S3G, a.k.a. 3279G, and was based on piecing together graphics with on-the-fly custom-defined symbols downloaded to the terminal.
The second later implementation provided All Points Addressable (APA) graphics, a.k.a. Vector Graphics, allowing more efficient graphics than the older technique. The first terminal to support APA / Vector graphics was the 3179G terminal that later was replaced by first the 3192G and later the 3472G.
Both implementations are supported by IBM GDDM - Graphical Data Display Manager first released in 1979, and by SAS with their SAS/GRAPH software.
IBM 3279G
IBM 3279-S3G, a.k.a. 3279G, terminal, announced in 1979, was IBM's graphics replacement for the 3279-3B with PSS. The terminal supported 7 colors and the graphics were made up of Programmable Symbol sets loaded to the terminal by the graphical application GDDM - Graphical Data Display Manager using Write Structured Field command.
Programmable Symbols is an addition to the normal base character set consisting of Latin characters, numbers, etc. hardwired into the terminal. The 3279G supports 6 additional sets of symbols each supporting 190 symbols, resulting in a total of 1.140 programmable symbols. 3 of the Programmable Symbols sets have 3 planes each enabling coloring (red, blue, green) the Programmable Symbols downloaded to those sets, thereby supporting a total of 7 colors.
Each ‘character’ cell consists of a 9x12 or a 9x16 dot matrix depending on the screen model. In order to program a cell with a symbol 18 bytes of data is needed making the data load quite heavy in some instances when compared to classic text screens.
If one for example wishes to draw a hyperbole on the screen, the application must first compute the required Programmable Symbols to make up hyperbole and load them to the terminal. The next step is then for the application to paint the screen by addressing the screen cell position and select the appropriate symbol in one of the Programmable Symbols sets.
The 3279G could be ordered with Attribute Select Keyboard enabling the operator to select attributes, colors and Programmable Symbols sets, making that version of the terminal quite distinctive.
IBM 3179G
The IBM 3179G announced June 18, 1985, is an IBM mainframe computer terminal providing 80×24 or 80×32 characters, 16 colors, plus graphics and is the first terminal to support the APA graphics apart from the 3270 PC/G, 3270 PC/GX, PC AT/G and PC AT/GX.
3179-G terminals combine text and graphics as separate layers on the screen. Although the text and graphics appear combined on the screen, the text layer actually sits over the graphics layer. The text layer contains the usual 3270-style cells which display characters (letters, numbers, symbols, or invisible control characters). The graphics layer is an area of 720×384 pixels. All Points Addressable or vector graphics is used to paint each pixel in one of sixteen colors. As well as being separate layers on the screen, the text and graphics layers are sent to the display in separate data streams, making them completely independent.
The application i.e. GDDM sends the vector definitions to the 3179-G, and the work of activating the pixels that represent the picture (the vector-to-raster conversion) is done in the terminal itself. The datastream is related to the number of graphics primitives (lines, arcs, and so on) in the picture. Arcs are split into short vectors, that are sent to the 3179-G to be drawn. The 3179-G does not store graphic data, and so cannot offload any manipulation function from GDDM. In particular, with user control, each new viewing operation means that the data has to be regenerated and retransmitted.
The 3179G is a distributed function terminal (DFT) and requires a downstream load (DSL) to load its microcode from the cluster controller's floppy disk or hard drive.
The G10 model is a standard 122-key typewriter keyboard, while the G20 model offers APL on the same layout. Compatible with IBM System/370, IBM 4300 series, 303x, 308x, IBM 3090, and IBM 9370.
IBM 3192G
The IBM 3192G, announced in 1987 was the successor to 3179G. It featured 16 colors, and support for printers (i.e., IBM Proprinter) for local hardcopy with graphical support, or system printer, text only, implemented as an additional LU.
IBM 3472G
The IBM 3472G announced in 1989 was the successor to 3192G and featured five concurrent sessions, one of which could be graphics. Unlike the 3192-G, it needed no expansion unit to attach a mouse or color plotter, and it needed no expansion unit to attach a mouse or color plotter and it could also attach a tablet device for digitised input and a bar code reader.
APL / APL2
Most IBM terminals, starting with the 3277, could be delivered with an APL keyboard, allowing the operator/programmer to enter APL symbolic instructions directly into the editor. In order to display APL symbols on the terminal, it had to be equipped with an APL character set in addition to the normal 3270-character set. The APL character set is addressed with a preceding Graphic Escape X'08' instruction.
With the advent of the graphic terminal 3179G, the APL character set was expandable to 138 characters, called APL2. The added characters were: Diamond, Quad Null, Iota Underbar, Epsilon Underbar, Left Tack, Right Tack, Equal Underbar, Squished Quad, Quad Slope, and Dieresis Dot. Later APL2 symbols were supported by 3191 Models D, E, L, the CUT version of 3192, and 3472.
Please note that IBM's version's of APL also is called APL2.
Display-Controller
3275 remote display with controller function (no additional displays up to one printer)
3276 remote display with controller function. IBM 3276, announced in 1981, was a combined remote controller and display terminal, offering support for up to 8 displays, the 3276 itself included. By default, the 3276 had two type A coax ports, one for its own display, and one free for an additional terminal or printer. Up to three additional adapters, each supporting two coax devices, could be installed. The 3276 could connect to a non-SNA or SNA host using BSC or SDLC with line speed of up to 9,600 bit/s. The 3276 looked very much like the 3278 terminal, and the terminal feature of the 3276 itself, was more or less identical to those of the 3278.
Printers
3284 matrix printer
3286 matrix printer
3287 printer, including a color model
3288 line printer
3268-1 R-loop connected stand-alone printer for the IBM 8100 system
4224 matrix printer
In 1984 announced IPDS – Intelligent Printer Data Stream for online printing of AFP - Advanced Function Presentation documents, using bidirectional communications between the application and the printer. IPDS support among others printing of text, fonts, images, graphics, and barcodes. The IBM 4224 is one of the IPDS capable dot matrix printers.
With the emergence of printers, including laser printers, from HP, Canon, and others, targeted the PC market, 3270 customers got an alternative to IBM 3270 printers by connecting this type of printers through printer protocol converters from manufactures like I-data, MPI Tech, Adacom, and others. The printer protocol converters basically emulate a 3287 type printer, and later extended to support IPDS.
The IBM 3482 terminal, announced in 1992, offered a printer port, which could be used for host addressable printing as well as local screen copy.
In the later versions of 3174 the Asynchronous Emulation Adapter (AEA), supporting async RS-232 character-based type terminals, was enhanced to support printers equipped with a serial interface.
Controllers
3271 remote controller
3272 local controller
3274 cluster controller (different models could be channel-attached or remote via BSC or SDLC communication lines, and had between eight and 32 co-ax ports)
3174 cluster controller
On the 3274 and 3174, IBM used the term configuration support letter, sometimes followed by a release number, to designate a list of features together with the hardware and microcode needed to support them.
By 1994 the 3174 Establishment Controller supported features such as attachment to multiple hosts via Token Ring, Ethernet, or X.25 in addition to the standard channel attach or SDLC; terminal attachment via twisted pair, Token Ring or Ethernet in addition to co-ax; and TN3270. They also support attachment of asynchronous ASCII terminals, printers, and plotters alongside 3270 devices.
3274 controller
IBM introduced the 3274 controller family in 1977, replacing the 3271–2 product line.
Where the features of the 3271–2 was hardcoded, the 3274 was controlled by its microcode that was read from the 3274's build in 8” floppy drive.
3274 models included 8, 12, 16, and 32 port remote controllers and 32-port local channel attached units. In total 16 different models were over time released to the market. The 3274-1A was an SNA physical Unit type 2.0 (PU2.0), required only a single address on the channel for all 32 devices and was not compatible with the 3272. The 3274-1B and 3274-1D were compatible with the 3272 and were referred to as local non-SNA models.
The 3274 controllers introduced a new generation of the coax protocol, named Category A, to differentiate them from the Category B coax devices, such as the 3277 terminal and the 3284 printer. The first Category A coax devices were the 3278 and the first color terminal, the IBM 3279 Color Display Station.
Enabling backward compatibility, it was possible to install coax boards, so-called ‘panels’, in groups of 4 or 8 supporting the now older Category B coax devices. A maximum of 16 Category B terminals could be supported, and only 8 if the controller were fully loaded with a maximum of 4 panels each supporting 8 Category A devices.
During its life span, the 3274 supported several features including:
Extended Data Stream
Extended Highlighting
Programmed Symbol Set (PSS)
V.24 interfaces with speed up to 14.4 kbit/s
V.35 interfaces with speed up to 56 kbit/s
X.25 network attachment
DFT – Distributed Function Terminal
DSL – Downstream load for 3290 and 3179G
9901 and 3299 multiplexer
Entry Assist
Dual Logic (the feature of having two sessions from a CUT mode display).
3174 controller
IBM introduced the 3174 Subsystem Control Unit in 1986, replacing the 3274 product line.
The 3174 was designed to enhance the 3270 product line with many new connectivity options and features. Like the 3274, it was customizable, the main difference was that it used smaller (5.25-inch) diskettes than the 3274 (8-inch diskettes), and that the larger floor models had 10 slots for adapters, some of them were per default occupied by channel adapter/serial interface, coax adapter, etc. Unlike the 3274, any local models could be configured as either local SNA or local non-SNA, including PU2.1 (APPN).
The models included: 01L, 01R, 02R, 03R, 51R, 52R, 53R, 81R and 82R.
The 01L were local channel attached, the R models remotely connected, and the x3R Token Ring (upstream) connected. The 0xL/R models were floor units supporting up to 32 coax devices through the use of internal or external multiplexers (TMA/3299). The 5xR, models were shelf units with 9 coax ports, expandable to 16, by the connection of a 3299 multiplexer. The smallest desktop units, 8xR, had 4 coax ports expandable to 8, by the connection of a 3299 multiplexer.
In the 3174 controller line IBM also slightly altered the classical BNC coax connector by changing the BNC connector to DPC – Dual Purpose Connector. The DPC female connector was a few millimeters longer and with a build-in switch that detected if a normal BNC connector were connected or a newer DPC connector was connected, thereby changing the physical layer from 93 ohm unbalanced coax, to 150 ohm balanced twisted-pair, thereby directly supporting the IBM Cabling system without the need for a so-called red balun.
Configuration Support A was the first microcode offered with the 3174. It supported all the hardware modules present at the time, almost all the microcode features found in 3274 and introduced a number of new features including: Intelligent Printer Data Stream (IPDS), Multiple Logical Terminals, Country Extended Code Page (CECP), Response Time Monitor, and Token Ring configured as host interface.
Configuration Support S, strangely following release A, introduced that a local or remote controller could act as 3270 Token-Ring DSPU Gateway, supporting up to 80 Downstream PU's.
In 1989, IBM introduced a new range of 3174 models and changed the name from 3174 Subsystem Control Unit to 3174 Establishment Controller. The main new feature was support for an additional 32 coax port in floor models.
The models included: 11L, 11R, 12R, 13R, 61R, 62R, 63R, 91R, and 92R.
The new line of controllers came with Configuration Support B release 1, increased the number of supported DSPU on the Token-Ring gateway to 250 units, and introduced at the same time ‘Group Polling’ that offloaded the mainframe/VTAM polling requirement on the channel.
Configuration Support B release 2 to 5, enabled features like: Local Format Storage (CICS Screen Buffer), Type Ahead, Null/Space Processing, ESCON channel support.
In 1990–1991, a total of 7 more models were added: 21R, 21L, 12L, 22L, 22R, 23R, and 90R. The 12L offered ESCON fibreoptic channel attachment. The models with 2xx designation were equal to the 1xx models but repacked for rackmount and offered only 4 adapter slots. The 90R was not intended as a coax controller, it was positioned as a Token Ring 3270 DSPU gateway. However, it did have one coax port for configuring the unit, which with a 3299 multiplexer could be expanded to 8.
The line of controllers came with Configuration Support C to support ISDN, APPN and Peer Communication. The ISDN feature allowed downstream devices, typically PC's, to connect to the 3174 via the ISDN network. The APPN support enabled the 3174 to be a part of an APPN network, and the Peer Communication allowed coax attached PC's with ‘Peer Communication Support’ to access resources on the Token-Ring network attached to the 3174.
The subsequent releases 2 to 6 of Configuration Support C enables support for: Split screen, Copy from session to session, Calculator function, Access to AS/400 host and 5250 keyboard emulation, Numerous APPN enhancements, TCP/IP Telnet support that allowed 3270 CUT terminals to communicate with TCP/IP servers using Telnet, and at the same time in another screen to communicate with the mainframe using native 3270. TN3270 support where the 3174 could connect to a TN3270 host/gateway, eliminating SNA, but preserving the 3270 data stream. IP forwarding allowing bridging of LAN (Token-Ring or Ethernet) connected devices downstream to the 3174 to route IP traffic onto the Frame Relay WAN interface.
In 1993, three new models were added with the announcement of Ethernet Adapter (FC 3045). The models were: 14R, 24R, and 64R.
This was also IBM's final hardware announcement of 3174.
The floor models, and the rack-mountable units, could be expanded with a range of special 3174 adapters, that by 1993 included: Channel adapter, ESCON adapter, Serial (V.24/V.35) adapter, Concurrent Communication Adapter, Coax adapter, Fiber optic “coax” adapter, Async adapter, ISDN adapter, Token-Ring adapter, Ethernet adapter, and line encryption adapter.
In 1994, IBM incorporated the functions of RPQ 8Q0935 into Configuration Support-C release 3, including the TN3270 client.
Non-IBM Controllers
GTE
The GTE IS/7800 Video Display Systems used one of two nominally IBM compatible controllers:
7801 (remote, 3271 equivalent)
7802 (local, 3277 equivalent)
Harris
The Harris 8000 Series Terminal Systems used one of four controllers:
8171 (remote, 3271 equivalent)
8172 (local, 3277 equivalent)
8181 (remote, 3271 equivalent)
8182 (local, 3277 equivalent)
9116
9210
9220
Home grown
An alternative implementation of an establishment controller exists in form of OEC (Open Establishment Controller). It's a combination of an Arduino shield with a BNC connector and a Python program that runs on a POSIX system. OEC allows to connect a 3270 display to IBM mainframes via TN3270 or to other systems via VT100. Currently only CUT but not DFT displays are supported.
Memorex
Memorex had two controllers for its 3277-compatible 1377; the 1371 for remote connection and the 1372 for local connection.
Later Memorex offered a series of controllers compatible with the IBM 3274 and 3174
2074
2076
2174
2274
Multiplexers
IBM offered a device called 3299 that acted as a multiplexer between an accordingly configured 3274 controller, with the 9901 multiplexer feature, and up to 8 displays/printers, thereby reducing the number of coax cables between the 3x74 controller and the displays/printers.
With the introduction of the 3174 controller internal or external multiplexers (3299) became mainstream as the 3174-1L controller was equipped with 4 multiplexed ports each supporting 8 devices. The internal 3174 multiplexer card was named TMA – Terminal Multiplexer adapter 9176.
A number of vendors manufactured 3270 multiplexers before and alongside IBM including Fibronics and Adacom offering multiplexers that supported TTP – Telephone Twisted Pair as an alternative to coax, and fiber-optic links between the multiplexers.
In some instances, the multiplexer worked as an “expansion” unit on smaller remote controllers including the 3174-81R / 91R, where the 3299 expanded the number of coax ports from 4 to 8, or the 3174-51R / 61R, where the 3299 expanded the number of coax ports from 8 to 16.
Manufacture
The IBM 3270 display terminal subsystem was designed and developed by IBM's Kingston, New York, laboratory (which later closed during IBM's difficult time in the mid-1990s). The printers were developed by the Endicott, New York, laboratory. As the subsystem expanded, the 3276 display-controller was developed by the Fujisawa laboratory, Japan, and later the Yamato laboratory; and the 3279 color display and 3287 color printer by the Hursley, UK, laboratory. The subsystem products were manufactured in Kingston (displays and controllers), Endicott (printers), and Greenock, Scotland, UK, (most products) and shipped to users in U.S. and worldwide. 3278 terminals continued to be manufactured in Hortolândia, near Campinas, Brazil as far as late 1980s, having its internals redesigned by a local engineering team using modern CMOS technology, while retaining its external look and feel.
Telnet 3270
Telnet 3270, or tn3270 describes both the process of sending and receiving 3270 data streams using the telnet protocol and the software that emulates a 3270 class terminal that communicates using that process. tn3270 allows a 3270 terminal emulator to communicate over a TCP/IP network instead of an SNA network. Telnet 3270 can be used for either terminal or print connections. Standard telnet clients cannot be used as a substitute for tn3270 clients, as they use fundamentally different techniques for exchanging data.
Technical Information
3270 character set
The 3270 displays are available with a variety of keyboards and character sets. The following table shows the 3275/3277/3284–3286 character set for US English EBCDIC (optional characters were available for US ASCII, and UK, French, German, and Italian EBCDIC).
On the 3275 and 3277 terminals without the a text feature, lower case characters display as uppercase. NL, EM, DUP, and FM control characters display and print as 5, 9, *, and ; characters, respectively, except by the printer when WCC or CCC bits 2 and 3 = '00'b, in which case NL and EM serve their control function and do not print.
Data stream
Data sent to the 3270 consist of commands, a Copy Control Character (CCC) or Write Control Character (WCC) if appropriate, a device address for copy, orders, character data and structured fields. Commands instruct the 3270 control unit to perform some action on a specified device, such as a read or write. Orders are sent as part of the data stream to control the format of the device buffer. Structured fields are to convey additional control functions and data to or from the terminal.
On a local non-SNA controller, the command is a CCW opcode rather than the first byte of the outbound display stream; on all other controllers, the command is the first byte of the display stream, exclusive of protocol headers.
Commands
The following table includes datastream commands and CCW opcodes for local non-SNA controllers; it does not include CCW opcodes for local SNA controllers.
Write control character
The data sent by Write or Erase/Write consists of the command code itself followed by a Write Control Character (WCC) optionally followed by a buffer containing orders or data (or both). The WCC controls the operation of the device. Bits may start printer operation and specify a print format. Other bit settings will sound the audible alarm if installed, unlock the keyboard to allow operator entry, or reset all the Modified Data Tags in the device buffer.
Orders
Orders consist of the order code byte followed by zero to three bytes of variable information.
Attributes
The 3270 has three kinds of attributes:
Field attributes
Extended attributes
Character attributes
Field attributes
The original 3277 and 3275 displays used an 8-bit field attribute byte of which five bits were used.
Bits 0 and 1 are set so that the attribute will always be a valid EBCDIC (or ASCII) character.
Bit 2 is zero to indicate that the associated field is unprotected (operator could enter data) or one for protected.
Bit 3 is zero to indicate that this field, if unprotected, could accept alphanumeric input. One indicates that only numeric input is accepted, and automatically shifts to numeric for some keyboards.
Bit 4 and 5 operate in tandem:
'00'B indicate that the field is displayed on the screen and is not selector-pen detectable.
'01'B indicates that the field is displayable and selector-pen detectable.
'10'B indicates that the field is intensified (bright), displayable, and selector-pen detectable.
'11'B indicates that the field is non-display, non-printable, and not pen detectable. This last can be used in conjunction with the modified data tag to imbed static data on the screen that will be read each time data was read from the device.
Bit 7 is the "Modified Data Tag", where '0' indicates that the associated field has not been modified by the operator and '1' indicates that it has been modified. As noted above, this bit can be set programmatically to cause the field to be treated as modified.
Later models include base color: "Base color (four colors) can be produced on color displays and color printers from current 3270 application programs by use of combinations of the field intensify and field protection attribute bits. For more information on color, refer to IBM 3270 Information System: Color and Programmed Symbols, GA33-3056."
Extended attributes
The 3278 and 3279 and later models used extended attributes to add support for seven colors, blinking, reverse video, underscoring, field outlining, field validation, and programmed symbols.
Character attributes
The 3278 and 3279 and later models allowed attributes on individual characters in a field to override the corresponding field attributes.
Buffer addressing
3270 displays and printers have a buffer containing one byte for every screen position. For example, a 3277 model 2 featured a screen size of 24 rows of 80 columns for a buffer size of 1920 bytes. Bytes are addressed from zero to the screen size minus one, in this example 1919. "There is a fixed relationship between each ... buffer storage location and its position on the display screen." Most orders start operation at the "current" buffer address, and executing an order or writing data will update this address. The buffer address can be set directly using the Set Buffer Address (SBA) order, often followed by Start Field or Start Field Extended. For a device with a 1920 character display a twelve bit address is sufficient. Later 3270s with larger screen sizes use fourteen or sixteen bits.
Addresses are encoded within orders in two bytes. For twelve bit addresses the high order two bits of each byte are set to form valid EBCDIC (or ASCII) characters. For example, address 0 is coded as X'4040', or space-space, address 1919 is coded as X'5D7F', or ''. Programmers hand-coding panels usually keep the table of addresses from the 3270 Component Description or the 3270 Reference Card handy. For fourteen and sixteen-bit address, the address uses contiguous bits in two bytes.
Example
The following data stream writes an attribute in row 24, column 1, writes the (protected) characters '> ' in row 24, columns 2 and 3, and creates an unprotected field on row 24 from columns 5-79. Because the buffer wraps around an attribute is placed on row 24, column 80 to terminate the input field. This data stream would normally be written using an Erase/Write command which would set undefined positions on the screen to '00'x. Values are given in hexadecimal.
Data Description
D3 WCC [reset device + restore (unlock) keyboard + reset MDT]
11 5C F0 SBA Row 24 Column 1
1D F0 SF/Attribute
[protected, alphanumeric, display normal intensity, not pen-detectable, MDT off]
6E 40 '> '
1D 40 SF/Attribute
[unprotected, alphanumeric, display normal intensity, not pen-detectable, MDT off]
SBA is not required here since this is being written at the current buffer position
13 IC - cursor displays at current position: Row 24, column 5
11 5D 7F SBA Row 24 Column 80
1D F0 SF/Attribute
[protected, alphanumeric, display normal intensity, not pen-detectable, MDT off]
Extended Data Stream
Most 3270 terminals newer than the 3275, 3277, 3284 and 3286 support an extended data stream (EDS) that allows many new capabilities, including:
Display buffers larger than 4096 characters
Additional field attributes, e.g., color
Character attributes within a field
Redefining display geometry
Querying terminal characteristics
Programmed Symbol Sets
All Points Addressable (APA) graphics
See also
3270 emulator
List of IBM products
IBM 5250 display terminal subsystem for IBM AS/400 and IBM System/3X family
Notes
References
3174Intro
3270ColorPSS
3270Intro
3270DS
3270CS
3274Desc
RFC1041
RFC1576
RFC2355
RFC6270
External links
Partial IBM history noting the unveiling of the 3270 display system in 1971
3270 Information Display System - 3270 Data Stream Programmer's Reference from IBM
Introduction to Telnet 3270 from Cisco
- Telnet 3270 Regime Option
- TN3270 Current Practices
- TN3270 Enhancements
3270 Data Stream Programming
rbanffy/3270font: A TTF remake of the font from the 3270
3270
3270
Block-oriented terminal
3270
Multimodal interaction
History of human–computer interaction
|
30605490
|
https://en.wikipedia.org/wiki/1927%20USC%20Trojans%20football%20team
|
1927 USC Trojans football team
|
The 1927 USC Trojans football team represented the University of Southern California (USC) in the 1927 college football season. In their third year under head coach Howard Jones, the Trojans compiled an 8–1–1 record (4–0–1 against conference opponents), tied with Stanford and Idaho for the Pacific Coast Conference championship, and outscored their opponents by a combined total of 287 to 64. The season featured the first game in the Notre Dame–USC football rivalry; Notre Dame won by a 13 to 12 score in Los Angeles.
Schedule
References
USC
USC Trojans football seasons
Pac-12 Conference football champion seasons
USC Trojans football
|
37875195
|
https://en.wikipedia.org/wiki/Tom%20Worthington%20%28computer%20programmer%29
|
Tom Worthington (computer programmer)
|
Thomas Worthington (born 3 February 1957) is an Australian computer programmer best known as an expert witness in the Maguire v SOCOG 2000 Olympic web accessibility case and teacher of Green computing.
He is known for his ICT policy work and on-line teaching.
Projects
Worthington was President of the Australian Computer Society (ACS). He gave evidence opposing Internet censorship on behalf of the ACS to an Australian Senate committee hearing in the mid 1990s.
Worthington appeared as an expert witness in the case Maguire v SOCOG 2000 in the Human Rights and Equal Opportunity Commission, providing an analysis of the accessibility for the disabled of the Sydney 2000 Olympics web site
He is the author of ICT Sustainability: Assessment and Strategies for a Low Carbon Future, a free open access book of course notes for Green computing courses run by the Australian National University and Australian Computer Society.
In July 2013 Worthington established a new business and website "Higher Education Whisperer", to provide advice on vocational and university course design, learning, teaching and research.
Academic achievements
Worthington undertook his computer programmer training in the Australian Public Service. He also completed a Certificate in Audio-Visual Video, Audio-Visual Video Production at the Canberra Institute of Technology in 1990. He was awarded a Graduate Certificate in Higher Education by The Australian National University and Certificate IV in Training and Assessment (TAE40110) from Canberra Institute of Technology (CIT) in 2013. He was awarded a Masters of Education in Distance Education by Athabasca University in February 2017.
Worthington has had research papers published on topics including e-learning for ICT sustainability and a proposal to combine the features of synchronous and asynchronous learning in one software package.
Employment
Worthington is an Adjunct Lecturer in the Research School of Computer Science, College of Engineering and Computer Science at the Australian National University, where he teaches ICT Sustainability, the design of web sites and use of e-commerce systems. He is also a member of the ANU Energy Change Institute and the ANU Climate Change Institute. Previously he worked as a civilian public servant employed by the Australian Department of Defence in the Australian Defence Force Headquarters, writing Internet and web policy.
Awards and honours
In May 1998, Computerworld magazine named Worthington as one of the most influential individuals in the Australian IT industry. In 1999 the Australian Computer Society elected Worthington a Fellow of the society for his contribution to public policy on the use of the Internet. He was later made an Honorary Life Member and Certified Professional. In 2010 Worthington was presented with the ACT ICT Educator of the Year 2010 Award for his work on sustainable computing education.
References
Australian computer programmers
1957 births
Living people
People from the Australian Capital Territory
Australian National University alumni
|
37076
|
https://en.wikipedia.org/wiki/Phrack
|
Phrack
|
Phrack is an e-zine written by and for hackers, first published November 17, 1985. Described by Fyodor as "the best, and by far the longest running hacker zine," the magazine is open for contributions by anyone who desires to publish remarkable works or express original ideas on the topics of interest. It has a wide circulation which includes both hackers and computer security professionals.
Originally covering subjects related to phreaking, anarchy and cracking, the articles also cover a wide range of topics including computer and physical security, hacking, cryptography, counter culture and international news.
Phrack "has had its finger on the pulse of hacker culture", and is considered both a handbook and manifesto for hackers.
Publications
E-Zine Releases
Issues of Phrack are divided in volumes, covering 1 or more years of publication.
Hardcover Releases
There were 3 hardcover releases. Each hardcover release contained most (but not all) articles of the E-Zine release. Both the hardcover and E-Zine were released simultaneously.
The PDF of the Phrack #63 Hardcover was made public in 2019.
History
Phrack, first released on November 17, 1985, takes its name from the words "phreak" and "hack". The founding editors of the magazine, known by the pseudonyms "Taran King" and "Knight Lightning", edited most of the first 30 editions. Editions were originally released onto the Metal Shop bulletin board system, where Taran King was a sysop, and widely mirrored by other boards. The headquarters was in Austin, Texas.
During its first 10 years of publication, Phrack was largely associated with telecommunications fraud, providing material for phreakers and informing about arrests in this community through its Phrack World News feature articles. Along with the release of articles such as "Smashing The Stack For Fun And Profit" and the editorship of daemon9/route in 1996, Phrack's orientation shifted toward computer security and its focus drew closer to the current definition of hacking.
Arrest of Knight Lightning
The 24th issue of Phrack, released February 1989, included a document relating to the workings of Enhanced 911 emergency response systems. This document, copied from a BellSouth computer, played a major part in a series of Secret Service raids called Operation Sundevil and featured in Bruce Sterling's book The Hacker Crackdown. Phracks editor, Knight Lightning, was arrested and charged with access device fraud and transportation of stolen property. The proceedings which ensued are known formally as United States v. Riggs, named for Knight Lightning's co-defendant Robert Riggs.
The E911 document was an administrative document describing which parts of the organization are responsible for what parts of the E911 system.
The Electronic Frontier Foundation filed an amicus brief supporting Knight Lightning, and helped to get the case dropped by introducing a witness who showed that Bellcore was selling more detailed documentation to the E911 system for as little as $13 to anyone who asked. The E911 document had been valued by the prosecution at over $80,000. The case was then dropped.
Phrack also showed up in the two-part "Operation Moon Witch" storyline, published in 1992's The Hacker Files by DC Comics, a story based on Operation Sundevil.
Pre 2000
After the arrest of Knight Lightning, and the shutdown of Phrack by the US Secret Service in late December 1989 few weeks after issue #30 was released, some attempts were made to resurrect Phrack under the editorship of Doc Holiday and Crimson Death. However, the lack of consent from the original editor to accept this Phrack Classic led to a new editorship for issue #33 by Dispater under the name Diet Phrack until issue #41.
Despite having acted as an informant against a member of a rival board after his arrest in March 1991, issue #42 is released under the editorship of Erik Bloodaxe in 1992. This new editorial staff makes Phrack legal and the magazine obtained an ISSN number from the Library of Congress. In September 1994, the first Phrack website appeared with release #46, containing all the files from the previous issues.
With the growing use of the internet and interest in computer security, 1996 marks a new era for Phrack as the magazine became increasingly oriented toward computer security. The editorship was handed to route along with voyager until 2000 (release #56). During this period, the Phrack website was defaced several times and the magazine was often unavailable.
Continuation after 2000
In 2000, the future editor gained control of the domain phrack.org (then registered at gandi.net, and not related to phrack.com) and started hosting all phrack releases (#1-#56) on a new website. Phrack.org became the de facto location for the Phrack Magazine after 2000. The previous editor (route) transferred control of phrack.com to the new staff in 2001.
Since 2001 Phrack is edited under the alias Phrackstaff to hide the identity of the true chief editor for the magazine. During the period from 2002 to 2005, a rival group referring itself as the Phrack High Council, "proud supporters of Project Mayhem",[14] protested against the supposed white hat behavior of certain members of the Phrackstaff and of some previous editorial staff members[15] mainly on the Full-Disclosure mailing list. However none of their files were actually incorporated in the official Phrack magazine as it had been the case after the Phrack Classic/Diet Phrack controversy.
In 2005, a former editor took the initiative to announce "the end of Phrack" despite a new team of editors having been formed. That announcement generated, as intended, quite some noise around issue #63. However, the announcement was actually more about the end of some major German/Austrian hacking groups such as TESO from which some of the 2001 to 2005 staff originated. Some of the staff re-grouped in 2007 with other members from the hacking community to continue Phrack.
Continuation after 2006
[[Image:Phrack.png|right|thumb|Phrack logo used on Phrack'''s website.]]
In 2005, it was announced that Phrack was to come to an end, with the 63rd issue as its last. To commemorate Phracks final appearance, this issue was to be a hardback edition, released simultaneously at the DEF CON and What the Hack conventions on July 29. An e-zine version of the release followed on August 1. The European printer for the hardcopies of Phrack to be distributed at Defcon refused to fulfil the order once they realized that they were printing a Hacking book. Two University of Arizona students filled the gap and printed between 100 and 200 copies of Phrack 63 in time for release at Defcon 13.
Copies of Phrack 63 distributed at Defcon 13 are each stamped with a "serial" number on the inside of the last page. It is believed that there are 100 numbered copies of Phrack 63 distributed at Defcon. All copies were hand cut and bound; unnumbered copies may be unreleased "extras", or may have cutting errors that deemed them unfit for distribution.
Issue 63 told readers to "expect a new release," and on May 27, 2007, issue 64 was released by a new board of editors referring to themselves as "The Circle of Lost Hackers". (TCLH). TCLH eventually released issue #65 of Phrack on April 11, 2008. On June 11, 2009, TCLH released another issue of Phrack, bringing the count up to 66. On March 15, 2010, it was announced that the 67th issue would be released on July 11, yet it was later postponed.
ContentPhrack issues are released irregularly, and like academic publications issues are grouped into volumes. Each issue comprises a number of Philes: stand-alone text files of very technical or counter-cultural content. Philes are submitted by members of the hacker underground community, and are reviewed by the editors.
Having an article published in Phrack is seen as prestigious by hackers, and often allowed access to more sources of information.
In addition to technical articles, Phrack also provided a focus for news and gossip among the hacker community.
In the 1990 National Computer Security Conference, Sheldon Zenner and Dorothy Denning suggested that Phrack articles contained the same factual content in computer and security magazines, but differed in tone.
Notable articlesPhrack is especially popular due to the general high standard of the releases compared to other underground zines, but has made its reputation from a number of high-quality articles.
"\/\The Conscience of a Hacker/\/ (aka the Hacker Manifesto)" by The Mentor has been an inspiration to young hackers since the 1980s, having been published in the 7th issue of Phrack.
"Smashing The Stack For Fun And Profit" by Aleph One, published in issue 49, is the "classic paper" on stack buffer overflows, partly responsible for popularizing the vulnerability.
"The Art of Scanning" by Fyodor, published September 1, 1997 in Issue 51 introduced the nmap Internet scanning tool.
Regular features
Several regular columns are present in most issues of Phrack'', such as:
Prophile - the presentation of a very influential character from the hacking underground.
Loopback - answers to the most original (or stupid) emails received by the phrack staff.
Phrack World News - a compilation of reports on the latest counter-culture events.
International Scenes - a compilation of testimonies from hackers all around the world focusing on national and international activities.
References
External links
the entire run of PHRACK on textfiles.com
Phrack 63 Hardcover PDF
1985 establishments in Texas
Hacker magazines
Irregularly published magazines published in the United States
Magazines established in 1985
Magazines published in Austin, Texas
Works about computer hacking
|
62443633
|
https://en.wikipedia.org/wiki/Stefan%20Roth
|
Stefan Roth
|
Stefan Roth (born on March 13, 1977 in Mainz, Germany) is a German computer scientist, professor of computer science and dean of the department of computer science of the Technische Universität Darmstadt. He heads the Visual Inference Lab.
He is known for his research on computer vision and machine learning techniques in computer vision. His research focuses on recognition and tracking of people and objects, scene understanding, statistical image modeling and processing and motion modeling and prediction.
Life
Roth studied computer science and engineering at the University of Mannheim, obtaining his diplom in 2001. The title of his thesis was "Analysis of a Deterministic Annealing Method for Graph Matching and Quadratic Assignment Problems in Computer Vision". He then studied computer science at Brown University, where he received his Master's degree. In 2007, he received his PhD in computer science under Michael Julian Black from the same institution. The title of his dissertation was "High-Order Markov Random Fields for Low-Level Vision". From 2007 to 2013 he was assistant professor and since 2013 professor at the department of computer science of the Technische Universität Darmstadt, where he heads the Visual Inference Lab. He is also dean of the department.
He is principal investigator of the ELLIS Unit at TU Darmstadt.
Awards
In 2001, he received the Dean’s Fellowship of Brown University. In 2005, he became associate member of Sigma Xi and received honorable mention for the Marr Prize at the International Conference on Computer Vision (ICCV). In 2010, Roth was awarded the Olympus Prize of the German Association for Pattern Recognition (DAGM), the highest German award for researchers in the areas of pattern recognition, image processing and computer vision. In 2012, he received the Heinz Maier-Leibnitz-Preis, the highest award for young researchers in Germany. In 2013, he received an ERC Starting Grant, the highest award of the European Union for young researchers, with a grant of 1.5 million euros for the project "Visual Learning and Inference in Joint Scene Models (VISLIM)". In 2019, he received an ERC Consolidator Grant. Roth is a member of the European Laboratory for Learning and Intelligent Systems (ELLIS).
Publications
D. Sun, S. Roth and M. J. Black, "Secrets of optical flow estimation and their principles," 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, San Francisco, CA, 2010, pp. 2432-2439. DOI:10.1109/CVPR.2010.5539939
Baker, S., Scharstein, D., Lewis, J.P. et al. Int J Comput Vis (2011) 92: 1. DOI:10.1007/s11263-010-0390-2
Roth, Stefan & Black, Michael. (2005). Fields of Experts: A Framework for Learning Image Priors.. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition. 2. 860-867. DOI: 10.1109/CVPR.2005.160.
Scharwächter T., Enzweiler M., Franke U., Roth S. (2013) Efficient Multi-cue Scene Segmentation. In: Weickert J., Hein M., Schiele B. (eds) Pattern Recognition. GCPR 2013. Lecture Notes in Computer Science, vol 8142. Springer, Berlin, Heidelberg. DOI: 10.1007/978-3-642-40602-7_46.
Gao, Qi & Roth, Stefan. (2012). How Well Do Filter-Based MRFs Model Natural Images?. 62-72. DOI: 10.1007/978-3-642-32717-9_7.
References
Living people
German computer scientists
1977 births
Technische Universität Darmstadt faculty
University of Mannheim alumni
Brown University alumni
|
39758769
|
https://en.wikipedia.org/wiki/Long-term%20support
|
Long-term support
|
Long-term support (LTS) is a product lifecycle management policy in which a stable release of computer software is maintained for a longer period of time than the standard edition. The term is typically reserved for open-source software, where it describes a software edition that is supported for months or years longer than the software's standard edition.
Short term support (STS) is a term that distinguishes the support policy for the software's standard edition. STS software has a comparatively short life cycle, and may be afforded new features that are omitted from the LTS edition to avoid potentially compromising the stability or compatibility of the LTS release.
Characteristics
LTS applies the tenets of reliability engineering to the software development process and software release life cycle. Long-term support extends the period of software maintenance; it also alters the type and frequency of software updates (patches) to reduce the risk, expense, and disruption of software deployment, while promoting the dependability of the software. It does not necessarily imply technical support.
At the beginning of a long-term support period, the software developers impose a feature freeze: They make patches to correct software bugs and vulnerabilities, but do not introduce new features that may cause regression. The software maintainer either distributes patches individually, or packages them in maintenance releases, point releases, or service packs. At the conclusion of the support period, the product either reaches end-of-life, or receives a reduced level of support for a period of time (e.g., high-priority security patches only).
Rationale
Before upgrading software, a decision-maker might consider the risk and cost of the upgrade.
As software developers add new features and fix software bugs, they may introduce new bugs or break old functionality. When such a flaw occurs in software, it is called a regression. Two ways that a software publisher or maintainer can reduce the risk of regression are to release major updates less frequently, and to allow users to test an alternate, updated version of the software. LTS software applies these two risk-reduction strategies. The LTS edition of the software is published in parallel with the STS (short-term support) edition. Since major updates to the STS edition are published more frequently, it offers LTS users a preview of changes that might be incorporated into the LTS edition when those changes are judged to be of sufficient quality.
While using older versions of software may avoid the risks associated with upgrading, it may introduce the risk of losing support for the old software. Long-term support addresses this by assuring users and administrators that the software will be maintained for a specific period of time, and that updates selected for publication will carry a significantly reduced risk of regression. The maintainers of LTS software only publish updates that either have low IT risk or that reduce IT risk (such as security patches). Patches for LTS software are published with the understanding that installing them is less risky than not installing them.
Software with separate LTS versions
This table only lists those have a specific LTS version in addition to a normal release cycle. Many projects, such as CentOS, provide a long period of support for every release.
1. The support period for Ubuntu's parent distribution, Debian, is one year after the release of the next stable version. Since Debian 6.0 "Squeeze", LTS support (bug fixes and security patches) was added to all version releases. The total LTS support time is generally around 5 years for every version. Due to the irregular release cycle of Debian, support times might vary from that average and the LTS support is done not by the Debian team but by a separate group of volunteers.
See also
References
Further reading
Computer security procedures
Product lifecycle management
Reliability engineering
Software maintenance
Software quality
|
26666629
|
https://en.wikipedia.org/wiki/Nintendo%203DS
|
Nintendo 3DS
|
The is a handheld game console produced by Nintendo. It was announced in March 2010 and unveiled at E3 2010 as the successor to the Nintendo DS. The system features backward compatibility with older Nintendo DS video games. As an eighth-generation console, its primary competitor was Sony's PlayStation Vita.
The handheld's most prominent feature is its ability to display stereoscopic 3D effects without the use of 3D glasses or additional accessories, and offers new features such as the StreetPass and SpotPass tag modes, powered by Nintendo Network; augmented reality using its 3D cameras; and Virtual Console, which allows owners to download and play games originally released on older video game systems. It is also pre-loaded with various applications including an online distribution store called Nintendo eShop; a social networking service called Miiverse (shut down on November 8, 2017); an Internet Browser; the Netflix, Hulu Plus, and YouTube streaming video services; Nintendo Video; a messaging application called Swapnote (known as Nintendo Letter Box in Europe and Australia); and Mii Maker.
The Nintendo 3DS was released in Japan on February 26, 2011, and worldwide beginning in March 2011. Less than six months later on July 28, 2011, Nintendo announced a significant price reduction from US$249 to US$169 amid disappointing launch sales. The company offered ten free NES games and ten free Game Boy Advance games from the Nintendo eShop to consumers who bought the system at the original launch price. This strategy was considered a major success, and the console went on to become one of Nintendo's most successful handheld consoles in the first two years of its release. , the Nintendo 3DS family of systems combined have sold 75.94 million units, and games for the systems have sold 387.42 million units as of September 30, 2021.
The 3DS received multiple redesigns over the course of its life. The Nintendo 3DS XL, a larger model, was first released in Japan and Europe in July 2012, featuring a 90% larger screen. An "entry-level" version of the console, the Nintendo 2DS, with a fixed "slate" form factor and lacking autostereoscopic (3D) functionality, was released in Western markets in October 2013. The New Nintendo 3DS features a more powerful CPU, a second analog stick called the C-Stick, additional buttons, an improved camera, and other changes, and was first released in Japan in October 2014.
The 3DS family was discontinued on September 16, 2020, though the Nintendo eShop and Nintendo Network remain active in most regions. While the 3DS stands as the lowest-selling Nintendo handheld, largely due to major adoption of smart devices, it is still regarded as a success, hosting several critically acclaimed games that helped it stay competitive, and helping Nintendo stay relevant in the industry despite the commercial underperformance of the Wii U.
History
Background
Nintendo began experimenting with stereoscopic 3D video game technology in the 1980s. The Famicom 3D System, an accessory consisting of liquid crystal shutter glasses, was Nintendo's first product that enabled stereoscopic 3D effects. Although very few titles were released, Nintendo helped design one—called Famicom Grand Prix II: 3D Hot Rally—which was co-developed by Nintendo and HAL Laboratory and released in 1988. The Famicom 3D System failed to garner market interest and was never released outside Japan.
Nintendo's second attempt with 3D development was the Virtual Boy, designed by Gunpei Yokoi, creator of the Game Boy handheld console and popular Metroid video game. It was a portable table-top system consisting of goggles and a controller that used a spinning disc to achieve full stereoscopic monochrome 3D. Released in 1995, the Virtual Boy sold fewer than a million units, with only 22 compatible game titles released, and was widely considered to be a commercial failure. Shigeru Miyamoto, known for his work on popular game franchises such as Mario and The Legend of Zelda, commented in a 2011 interview that he felt conflicted about Yokoi's decision to use wire-frame models for 3D and suggested that the product may not have been marketed correctly. The failure of the Virtual Boy left many at Nintendo doubting the viability of 3D gaming.
Despite this, Nintendo continued to investigate the incorporation of 3D technology into later products. The GameCube, released in 2001, was also capable of displaying true stereoscopic 3D with an LCD attachment, though only the launch title Luigi's Mansion was ever designed to utilize it. Due to the expensive nature of the requisite peripheral technology at the time, the GameCube's 3D functionality was never marketed to the public. Nintendo later experimented with a 3D LCD during the development of the Game Boy Advance SP, but the idea was shelved after it failed to achieve satisfactory results. Another attempt was made in preparation for a virtual navigation guide to be used on the Nintendo DS at Shigureden, an interactive museum in Japan. Nintendo president Hiroshi Yamauchi encouraged additional 3D research in an effort to use the technology in the exhibition. Although the project fell short, Nintendo was able to collect valuable research on liquid crystal which would later aid in the development of the Nintendo 3DS.
Development
Speculation on the development of a successor to the Nintendo DS began in late 2009. At the time, Nintendo controlled as much as 68.3% of the handheld gaming market. In October 2009, tech tabloid Bright Side of News reported that Nvidia, a graphics processing unit (GPU) developer that recently made headway with its Tegra System-on-Chip processors, had been selected by Nintendo to develop hardware for their next generation portable game console. Later that month, speaking about the future for Nintendo's portable consoles, company president Satoru Iwata mentioned that while mobile broadband connectivity via subscription "doesn't fit Nintendo customers", he was interested in exploring options like Amazon's Whispernet found on the Amazon Kindle which provides free wireless connectivity to its customers for the sole purpose of browsing and purchasing content from the Kindle Store.
Nintendo had expressed interest in motion-sensing capabilities since the development of the original Nintendo DS, and an alleged comment by Satoru Iwata from a 2010 interview with Asahi Shimbun implied that the successor to the Nintendo DS would incorporate a motion sensor. The claim led to a minor dispute between the publication and Nintendo over its accuracy. In February 2010, video gaming website Computer and Video Games reported that a select "handful" of Japanese developers were in possession of software development kits for the Nintendo DS successor, with The Pokémon Company given special priority. According to their insider at an unspecified third-party development studio, the hardware features a "tilt" function that is similar to that of the iPhone, "but does a lot more".
Announcement
On March 23, 2010, Nintendo officially announced the Nintendo 3DS handheld console, the successor to the Nintendo DS family. According to industry analysts, the timing of Nintendo's original announcement, which had drawn attention away from the launch of the company's still-new Nintendo DSi XL handheld, was likely intended to preempt impending news leaks about the product by the Japanese press. In April 2010, a picture of a possible development build of the internal components of the 3DS was released as part of a U.S. Federal Communications Commission (FCC) filing by Mitsumi. An analysis of the image showed that it was likely genuine as it featured components known to be used in the Nintendo DS line along with features of the 3DS that had not been announced like a 5:3 top screen and a control nub similar to those used in Sony's PlayStation Portable systems.
In June 2010, video gaming website IGN reported that according to "several developers who have experienced 3DS in its current form," the system possesses processing power that "far exceed[s] the Nintendo Wii" and with 3D shaders, they could make games that "look close to current generation visuals on the Xbox 360 and PlayStation 3". IGN also cited "several developer sources" as saying that the system does not use the Nvidia Tegra mobile chipset.
The system was fully revealed at Nintendo's conference at E3 2010 on June 15, 2010. The first game revealed was Kid Icarus: Uprising, and several other titles from third parties were also announced, including Square Enix with Kingdom Hearts and Final Fantasy, Konami with Metal Gear Solid 3: Snake Eater 3D, Warner Bros. Interactive with a Batman title, Ubisoft with Assassin's Creed: Lost Legacy, Capcom with Resident Evil: Revelations and Super Street Fighter IV: 3D Edition, and Activision with DJ Hero. Other Nintendo titles were later revealed after the conference, such as Mario Kart 7, Animal Crossing: New Leaf, and remakes of Star Fox 64 and The Legend of Zelda: Ocarina of Time. Nintendo also demoed 3D trailers for DreamWorks' How to Train Your Dragon, Warner Bros' Legend of the Guardians: The Owls of Ga'Hoole, and Disney's film Tangled on the 3DS. The 3DS design shown at E3 was almost final, but subject to minor changes.
On September 29, 2010, Nintendo announced that the Nintendo 3DS would be released in Japan on February 26, 2011. Furthermore, several additional features were announced: the inclusion of a Mii Maker (similar to the Mii Channel on the Wii), Virtual Console (including Game Boy and Game Boy Color), 3D Classics, a cradle for recharging the system's battery, multitasking, several included augmented reality games, an included 2 GB SD card, and stored game data, as well as the final names for the 3DS tag modes, StreetPass and SpotPass collectively. Nintendo further revealed that the system would be available at launch in two colors, Aqua Blue and Cosmos Black, and that its launch price in Japan would be ¥25,000. The final physical design was also revealed at this event.
Pre-launch events
On January 19, 2011, Nintendo held two simultaneous press conferences in Amsterdam and New York City, where it revealed all of the features of the Nintendo 3DS. In North America, the release date was confirmed as March 27, 2011, with a retail price of $249.99. In Europe, the release date was announced as March 25, 2011, though Nintendo said that pricing would be up to retailers. Most retailers priced the handheld between £219.99 and £229.99, though some retailers, such as Amazon, lowered the price following Sony's announcement of the PSP's successor on January 26, 2011, with some retailers pricing the handheld at around £200 in February.
In February 2011, Nintendo held four hands-on events in the UK named "Believe Your Eyes". February 5 and 6 saw simultaneous events in London and Manchester, while the 12th and 13th saw events in Glasgow and Bristol. Invitations to the events were offered first to Club Nintendo members, then later to members of the public via an online registration form. Guests watched two brief performances and trailers, then were given time to play a selection of games on 3DS devices. Attendees were then allowed into a second room, containing further games to play (mainly augmented reality-based) and in-device videos. In March, Nintendo held a few events in Australia at selected Westfield stores for people to try out the console, with a number of demos available.
Launch
The Nintendo 3DS launched in Japan on February 26, 2011, priced at ¥25,000. On March 25, 2011, the system launched in Europe, with pricing set by individual retailers. On March 27, 2011, the Nintendo 3DS launched in North America, priced at US$249.99. On March 31, 2011, the system launched in Australia and New Zealand, priced at A$349.95. The system was originally launched in all regions in both Aqua Blue and Cosmo Black color variations.
On July 28, 2011, Nintendo announced the Nintendo 3DS would be getting a price cut of almost a third of the console's original price, from $249.99 to $169.99 in North America, 25,000¥ to 15,000¥ in Japan, and $349.95 to $249.95 in Australia. Although in Europe, pricing is up to retailers, the system also received a substantial price cut. In an effort to compensate those who had paid the original price, the company introduced the Nintendo 3DS Ambassador Program, through which existing 3DS owners were eligible (conditional that they must have accessed the Nintendo eShop at least once prior to August 21) to download ten NES games and ten Game Boy Advance games at no extra cost. Nintendo further stated that the NES Ambassador titles would see future release to the general public on the Nintendo eShop, while there were no plans to make the Game Boy Advance Ambassador titles available. The ten NES games were released in North America on August 31 and in Europe on September 1, 2011. These include: Balloon Fight, Donkey Kong Jr., Ice Climber, Metroid, NES Open Tournament Golf, Super Mario Bros., The Legend of Zelda, Wrecking Crew, Yoshi (North America) / Mario & Yoshi (Europe & Australia), and Zelda II: The Adventure of Link. The ten Game Boy Advance games were released in North America on December 16, 2011. These include: F-Zero: Maximum Velocity, Fire Emblem: The Sacred Stones, Kirby & The Amazing Mirror, Mario Kart: Super Circuit, Mario vs. Donkey Kong, Metroid Fusion, Super Mario Advance 3: Yoshi's Island, The Legend of Zelda: The Minish Cap, Wario Land 4, and WarioWare, Inc.: Mega Microgames!
On April 28, 2012, the Nintendo 3DS launched in South Korea, in Cosmos Black, Misty Pink, and Cobalt Blue color variations. On September 28, 2012, the system launched in two other regions, Hong Kong and Taiwan, in Cerulean Blue and Shimmer Pink.
Larger model
Rumors of a larger model of the Nintendo 3DS being in production appeared during June 2012, when Japanese publication Nikkei wrote an article stating that the system was initially scheduled to be unveiled at E3 2012. However, Nintendo responded that these rumors were false and that the article was "entire speculation", but refrained from further commenting on the subject. Finally, on June 21, 2012, the system was announced during a Nintendo Direct presentation. Featuring 90% larger screens than the original Nintendo 3DS, the system was set to launch on all major regions during the middle of the year.
The Nintendo 3DS XL (Nintendo 3DS LL in Japan) was released on July 28, 2012, in Japan, priced at ¥18,900, and was available in Silver + Black, Red + Black and White color variations. In Europe, the system launched on the same day but in Silver + Black, Blue + Black and Red + Black color variations. On August 19, the Nintendo 3DS XL launched in North America, priced at US$199.99, and available in Red + Black and Blue + Black. On August 23, 2012, Australia and New Zealand saw the launch of the new handheld, priced at AU$249.95, and available in the same color variations as in Europe, Silver + Black, Blue + Black and Red + Black. The launch of the Nintendo 3DS XL coincided with the release of New Super Mario Bros. 2, the first Nintendo 3DS game to be available in both retail and downloadable versions.
On September 20, 2012, the Nintendo 3DS XL launched in South Korea, in Silver + Black, Red + Black, and White color variations. On September 28, 2012, the system launched in two other regions, Hong Kong and Taiwan, in Blue + Black and White color variations. In December 2012, Nintendo Chinese distribution partner, iQue, launched the iQue 3DS XL in three special editions, one featuring a Mario decal while the other two feature both Mario and Luigi.
Later years
Nintendo officially announced their next console, the Nintendo Switch, in October 2016 and with worldwide release in March 2017. The Switch is a hybrid video game console that can be used both as a home console docked to a television or taken on-the-go to be used as a handheld system. While the Switch displaced the Wii U as Nintendo's primary home console in terms of production and distribution, Nintendo executives affirmed that the company would continue to support the 3DS with more first-party and third-party games in the immediate future. Fils-Aimé assured that the 3DS "has a long life in front of it", and that Nintendo intends for it to co-exist with the Switch, while Kimishima considered the 3DS as an entry-level product for younger players. In June 2017, Fils-Aimé said they would be supporting Nintendo 3DS beyond 2018. In July 2017, production of the New Nintendo 3DS had ended in Europe and Japan leaving the New Nintendo 3DS XL and then-recently released New Nintendo 2DS XL as the only 3DS models still in production worldwide. In June 2018, Nintendo said it was considering some possibilities for a successor to the Nintendo 3DS.
In June 2019, Nintendo confirmed that first-party game development had ceased, but that the system would continue to be supported through the near future. With the unveiling of the Nintendo Switch Lite—a lower-end version of the Switch console—Nintendo of America CEO Doug Bowser stated that the company still planned to continue supporting the 3DS family as long as there was still demand. In November 2019, Bowser reaffirmed that Nintendo would continue to support the 3DS into 2020. On September 16, 2020, Nintendo confirmed that production of the Nintendo 3DS family of systems had ended. On July 20, 2021, Nintendo's Japanese website announced that the Nintendo 3DS and Wii U eShops would no longer accept credit cards. This change is set to be put in place on January 18, 2022. The Internet Browser's filter function will also not be able to be turn off for Japanese 3DS devices after this date.
Hardware
The following explicitly refers to the original Nintendo 3DS model. Some technical details do not apply to later Nintendo 2DS and New Nintendo 3DS models.
The Nintendo 3DS has custom components co-developed by the Nintendo Research & Engineering department and other manufacturers, all combined into a unified system on chip. Its main central processing unit (CPU) is a dual-core ARM11 MPCore-based processor manufactured at and clocked at . One processor core is dedicated to games and applications, while the other core is exclusive to the operating system, enabling multitasking and background tasks. These tasks are handled seamlessly in the background during gameplay or while the system is in sleep mode. The system also contains a single-core ARM9-based processor, enabling backward compatibility with both Nintendo DS and DSi titles. The graphics processor (GPU) is a PICA200 developed by Digital Media Professionals, running at . The system contains of random-access memory (RAM) consisting of of FCRAM developed by Fujitsu, with a peak bandwidth of .
The console contains two separate screens. The top screen is a 15:9 (5:3) autostereoscopic liquid-crystal display (LCD) with a resolution of (effectively per eye, or WQVGA). On the original 3DS, the screen measures , while on the 3DS XL it measures . It is autostereoscopic; it uses a parallax barrier to produce a three-dimensional effect without requiring special glasses. There is a 3D Depth Slider next to the screen for adjusting the 3D effect or turning it off altogether. The bottom screen is a 4:3 resistive touchscreen with a display resolution of 320×240 pixels (QVGA). On the original Nintendo 3DS, the screen measures , while on the 3DS XL it measures .
The system features three camera sensors: two cameras on the outside of the device, capable of taking 3D photos and capturing 3D video; and one camera facing the user positioned above the top screen. All camera sensors have a maximum resolution of 640×480 pixels (0.3 megapixels, VGA) with one-point focus and can only achieve digital zoom. There is also a microphone in the bottom of the system.
The system includes of eMMC flash memory manufactured by either Toshiba or Samsung. The system's memory can be expanded via an SD memory card slot, which supports SD and SDHC memory cards. All the Nintendo 3DS systems come packaged with a 2 GB SD card while Nintendo 3DS XL systems include a SDHC card. The system uses 2.4 GHz 802.11 b/g wireless network connectivity with enhanced WPA2 security. There is also an infrared port on the back of the console, which allows the system to connect with certain peripherals such as the Circle Pad Pro and the amiibo reader/writer.
The Nintendo 3DS comes with a lithium ion battery. Its longevity fluctuates between 3 and 5 hours while playing Nintendo 3DS games and between 5 and 8 hours while playing Nintendo DS games, depending on brightness, volume and wireless settings. The Nintendo 3DS XL, however, comes with a 1750 mAh, 3.7 V lithium-ion battery capable of lasting between 3.5 and 6.5 hours playing 3DS games and 6 to 10 hours playing DS games. While the original 3DS weighs approximately , the larger XL version weighs approximately . When opened, the original 3DS is wide, broad, and thick. The XL version however, is wide, broad, and thick. The 3DS also come with a telescoping stylus, extendable to up to long, while the 3DS XL come with a regular stylus.
All systems in the Nintendo 3DS family use the same AC adapter used with the Nintendo DSi and Nintendo DSi XL. In order to reduce production costs, certain console bundles, such as Japanese and European releases of the Nintendo 3DS XL and the New Nintendo 3DS, were not bundled with an AC adapter, requiring players to either use one from an older system they may own or purchase one separately. Along with plugging the adapter directly into the system, the standard Nintendo 3DS comes with a charging cradle, which players place their system in to charge. Charging cradles for the Nintendo 3DS XL and New Nintendo 3DS systems are sold separately from their respective systems, and there is no cradle for the Nintendo 2DS.
Input
The Nintendo 3DS input controls include the following: a round nub analog input called the Circle Pad, a D-pad, four face buttons (A, B, X, Y), bumper buttons (L, R), a Home button, Start and Select buttons, and a Power button. It also features a dedicated volume slider and a wireless switch, which turns on or off wireless communications. The touchscreen can be interacted with either the user's finger or a stylus bundled with the handheld. There is also a six-axis motion sensor, which includes a 3-axis accelerometer and a 3-axis gyroscope. Through the Circle Pad Pro accessory the system has access to a second Circle Pad and trigger buttons (ZL, ZR).
Game card
The Nintendo 3DS Game Card is a media format used to physically distribute video games for Nintendo 3DS systems. The 3DS Game Card is similar in design to the Nintendo DS Game Card, but includes a small tab on the top left of the card that prevents 3DS Game Cards from being inserted into a Nintendo DS. These Game Cards can hold up to either 1 GB, 2 GB or 4 GB of game data depending on the game, which is 2, 4, and 8 times more storage, respectively, than the biggest Nintendo DS Game Card's capacity (512 MB). Some sources claim that an 8 GB version could be produced should a game ever require it.
Accessories
Circle Pad Pro
The Circle Pad Pro is an accessory/add-on which connects to a Nintendo 3DS system through infrared, adding support for a second Circle Pad, a substitute R button input (as the original one becomes difficult to reach), and an extra set of trigger buttons (ZL / ZR). The device was first released in Japan on December 10, 2011, coinciding with the release of Monster Hunter 3G in the region. It was subsequently released in Europe on January 27, 2012, in Australia on February 2, 2012, and in North America on February 7, 2012, coinciding with the release of Resident Evil: Revelations in those regions.
Images of the device first appeared in September 2011 in Famitsu The first titles confirmed to compatible with the add-on were Monster Hunter 3G, Resident Evil: Revelations, Ace Combat 3D Cross Rumble (Japanese version only), Metal Gear Solid: Snake Eater 3D, Kingdom Hearts 3D: Dream Drop Distance, and Shin Sangoku Musou VS.
The Nintendo 3DS XL version of the device, called the Circle Pad Pro XL, was released in Japan on November 15, 2012, Europe on March 22, 2013, and North America on April 17, 2013.
The C-Stick and ZL / ZR buttons on the New Nintendo 3DS are backward compatible with Circle Pad Pro-compatible titles.
Stand
This accessory came bundled exclusively with every retail copy of Kid Icarus: Uprising. The stand made the game, and other games with similar controls such as Liberation Maiden, easier to play for various users, as it helped free the tension of suspending the console with one hand since the other hand would be using the stylus on the touch screen for longer periods than usual.
NFC Reader/Writer
A near-field communication (NFC) reader and writer was released on September 25, 2015, in North America at and on October 2 in Europe, alongside Animal Crossing: Happy Home Designer. This peripheral enables Amiibo support for the Nintendo 3DS, 3DS XL, and 2DS, a feature already built-in to New Nintendo 3DS systems. The accessory is powered by two AA batteries.
Other models
The Nintendo 3DS family consists of six models. Apart from the regular-sized Nintendo 3DS, the Nintendo 3DS XL is a larger model of the console which was released on July 28, 2012, and features 90% larger screens than the original Nintendo 3DS. The Nintendo 2DS is a complete redesign of the handheld which was released on October 12, 2013, and is described as an "entry level" version of the 3DS. This console, while still capable of playing Nintendo DS and 3DS games, removes the 3D functionality and changes the form factor to a fixed, "slate" design. The New Nintendo 3DS, which also has an XL variant, adds additional controls and improved functionality, and is able to play certain games not compatible with the previous models. A cheaper alternative, the New Nintendo 2DS XL, incorporates some of the features from the New Nintendo 3DS with elements from the 2DS such as the lack of stereoscopic 3D functionality; it also shifts from the slate form factor of the original 2DS model to a clamshell design.
Nintendo 2DS
The Nintendo 2DS (abbreviated to 2DS) was announced on August 28, 2013, as a new entry-level model of the Nintendo 3DS family. While its hardware and software are relatively similar to the Nintendo 3DS (and still offers compatibility with Nintendo DS and 3DS games), it lacks the 3DS's signature 3D screen, does not have internal stereo speakers (only using a mono speaker), and uses a slate-like form factor as opposed to the clamshell design used by its Nintendo DS and 3DS predecessors. The Nintendo 2DS was released in North America and Europe on October 12, 2013, coinciding with the launch of Pokémon X & Y and is being sold alongside the Nintendo 3DS and 3DS XL at a relatively lower price point.
As a cheaper model of the Nintendo 3DS family that plays both Nintendo DS and 3DS games, the Nintendo 2DS is seen as a market strategy to broaden the overall Nintendo handheld gaming market. As such, the 2DS is a handheld console targeted at a different audience than that of the regular Nintendo 3DS models, particularly younger users. Despite concerns from critics who felt that the company was trying to de-emphasize the 3D functionality by releasing the 2DS, Nintendo maintains that 3D is still part of their future plans.
New Nintendo 3DS
The New Nintendo 3DS and New Nintendo 3DS XL (known as New Nintendo 3DS LL in Japan) are updated revisions of the 3DS and 3DS XL that were first unveiled during a Japanese Nintendo Direct presentation on August 29, 2014. The new models feature a more powerful processor, face tracking for improved 3D viewing angles, additional ZL/ZR shoulder buttons and a new "C-Stick" pointing stick that are comparable to and backward compatible with games that support the Circle Pad Pro, colored face buttons inspired by those of Super NES controllers, automatic brightness adjustment, microSD storage, larger batteries, and integrated near-field communications support for use with Amiibo products. The regular-sized New Nintendo 3DS also has slightly larger screens than the prior model, and a suite of interchangeable faceplates.
As with its predecessors, the New Nintendo 3DS is compatible with existing DS and 3DS titles. Some software titles, such as Xenoblade Chronicles 3D and Super NES games released for Virtual Console, are specifically optimized for the device and its upgraded processor and are incompatible with the earlier 3DS and 2DS models.
The systems were released in Japan on October 11, 2014, in Australia and New Zealand on November 21, 2014, and at retail in Europe and North America on February 13, 2015. Only the XL version was made available in North America at launch, though the smaller model was later released in a series of limited edition bundles.
New Nintendo 2DS XL
On April 27, 2017, Nintendo unveiled the New Nintendo 2DS XL (known as New Nintendo 2DS LL in Japan), which was released in North America and Europe on July 28, 2017 and Japan on July 29, 2017. The system is a variation of the New Nintendo 3DS line, featuring the additional hardware features and software compatibility of the New Nintendo 3DS, albeit without the stereoscopic 3D functionality, and a foldable form factor. The system did not receive a non-XL variant.
Software
Operating system
The Home Menu is a graphical user interface similar to the Nintendo DSi Menu and Wii U Menu for Nintendo 3DS systems. It is used to launch software stored on Nintendo DS and Nintendo 3DS Game Cards, applications installed on a SD card, and DSiWare titles installed in the system's internal memory. Application icons are set in a customizable grid navigable on the lower screen. On the upper screen, a special 3D animated logo is displayed for each individual app, as well as system information such as wireless signal strength, date and time, and battery life. Using the Home button, users can suspend the current software that is running and bring up the Home Menu, allowing the user to launch certain multitasking applications, such as the Internet Browser and Miiverse.
Similarly to the Nintendo DSi, the menu has updateable firmware. On April 25, 2012, a system update brought the introduction of a folder system, which allows users to put applications inside folders. On June 20, 2013, a system update brought the introduction of the Save Data Backup feature, which allows the user to back up save data from downloadable Nintendo 3DS software and most Virtual Console games. An update was released on October 30, 2014, to enable players to download custom themes for the Home Menu, based on various Nintendo titles.
Camera
Nintendo 3DS Camera is a built-in photo and video recorder with an integrated media gallery and photo editing functionality. The app uses the system's two front-facing cameras to take 3D photos, and the user-facing camera to take regular 2D photos. All photographs are taken at a resolution of 640 x 480 px (VGA), or 0.3 megapixels. The two perspectives of 3D photographs are stored into two separate files, with JPG and MPO extensions.
There are various options and filters available when taking photos or recording video. There is also a Low-Light option, which is useful when taking photos and recording video in low lighting conditions.
On December 7, 2011, a system update added the ability to record 3D video along special recording options, such as the ability to make stop motion animations. All recording modes only allow a single video to be up to 10 minutes long.
Sound
Nintendo 3DS Sound is a built-in music player and sound recorder. Supported filename extensions include MP3 audio with .mp3 and AAC audio with .mp4, .m4a, or .3GP. Audio files can be played from an SD card, with visualizations displayed on the upper screen. Music can be played while the console is closed, using the system's headphone jack. A set of sound manipulation options are available, as well as several audio filters. Ten-second voice recordings can also be recorded and edited. These can then be shared throughout other applications such as Swapnote. There is also a StreetPass function built-into the app, where users exchange song data to make a compatibility chart between them.
Nintendo eShop
Nintendo eShop is the Nintendo 3DS's online software distribution service. Launched in June 2011, the eShop provides downloadable retail and download-only Nintendo 3DS titles, Virtual Console titles, and various applications and videos. It also allows users to purchase downloadable content (DLC) and automatically download patches for both physical and downloadable games. All content obtained from Nintendo eShop is attached to a Nintendo Network ID but can only be used in one system. Background downloading is possible via SpotPass, while playing games or in sleep mode. Up to ten downloads can be queued at a time and their status can be checked on the Home Menu. The Nintendo eShop supports simple user software reviews. Users can submit a review with "stars" ranging from one to five, representing its quality in a crescent order, and categorize software by whether it is suitable for hardcore or more casual players. User reviews can only be submitted after using the software for at least one hour.
Certain Latin American and Caribbean countries, which feature a more limited eShop, had their systems closed in July 2020. Countries in the region with the full eShop and the rest of the world are currently unaffected until March 2023.
It was later announced on February 15, 2022 that support for Nintendo eShop for the Wii U and Nintendo 3DS for the rest of the world would be discontinued in late March 2023, with the ability to add credit cards ceasing by May 23, 2022, followed by the inability to add funds by August 29, 2022.
Miiverse
Miiverse was an integrated social networking service, which allowed players to interact and share their gaming experiences through their personal Mii characters. It was originally launched on Wii U and was launched on the Nintendo 3DS on December 11, 2013, via a firmware update. Its functionality was similar to the Wii U version albeit without the private messaging feature, and required a Nintendo Network ID.
Miiverse allowed users to seamlessly share accomplishments, comments, hand written notes, and game screenshots with other players on various communities specific to their games and applications. It was possible to access Wii U communities on the Nintendo 3DS and vice versa. It was also possible to access Miiverse on any internet enabled smartphone, tablet and PC. The service was moderated through software filtering as well as a human resource team in order to ensure that the content shared by users was appropriate and that no spoilers were shared. It was also possible to post screenshots from certain games to social networking websites such as Twitter, Tumblr and/or Facebook via the Nintendo 3DS Image Share service.
On November 7, 2017, the Miiverse servers closed down for the 3DS and the Wii U.
Internet browser
The Nintendo 3DS's internet browser was released via a firmware update on June 6, 2011, in North America and June 7, 2011, in Europe and Japan. It functions as a multitasking system application and can be used while another application is suspended in the background. The browser contains a text wrap option to automatically wrap text to the width of the screen at different zoom levels, and is mainly controlled with the stylus or the Circle Pad and the D-pad to cycle through links on the page. The browser supports HTML, CSS, JavaScript and some HTML5 elements but does not support Flash, video or music. It can also download and show 3D images with the .mpo file extension and allows users to save images on an SD card. Additionally the browser supports JPEG and MPO image uploads from the system's photo gallery. The user can also choose between the Google and the Yahoo! search engines, and can also create bookmarks.
The 3DS also shipped with the Nintendo Zone Viewer. The Nintendo Zone Viewer was a 3D enabled browser that was developed by Nintendo to support location-based Nintendo Zone interaction.
Video services
Nintendo Video launched in Australia, Europe, and Japan on July 13, 2011, and in North America on July 21, 2011, along with a tutorial video. The service periodically updates its video content availability through SpotPass, automatically adding and deleting content from the console. Up to four videos can be available through the app at the same time. Nintendo Video content include: established series such as Oscar's Oasis and Shaun the Sheep (with fifteen exclusive episodes); original series such as Dinosaur Office and BearShark by CollegeHumor; short films; movie trailers; and sports videos by Redbull and BSkyB. The Nintendo Video app was discontinued in the Japanese, European and Oceania regions by April 2014, and in North America by July 2015. In North America at least, the "Nintendo Video" name continues to exist via a permanent Nintendo eShop category for all hosted videos that previously featured on the former app, as well as potential new content. The permanently hosted online "Nintendo Video" eShop videos can be viewed on-demand at any time without additional costs.
The Netflix streaming video service was released in North America on July 14, 2011. Netflix users are able to pause streaming video on the Nintendo 3DS and resume it on other Netflix-enabled devices. Only 2D content is available through the service. The Netflix app was discontinued on June 30, 2021. Nintendo announced on October 21, 2011, that Hulu Plus would be released on the Nintendo 3DS by the end of the year. On February 16, 2012, following the debut of Hulu on the Wii, Nintendo reiterated the announcement this time claiming it would be available on the 3DS sometime in 2012. Finally, on August 6, 2013, the Hulu application became available in Japan and on October 17, 2013, the Hulu Plus application was launched in North America, along with a one-week free trial. On November 29, 2013, the YouTube application was released for the Nintendo 3DS in Europe and North America. It was discontinued in August 2019.
Discontinued video services
The SpotPass TV service launched in Japan on June 19, 2011. The service was a joint service between Nippon TV and Fuji TV that brought free 3D video content to Nintendo 3DS users in Japan. Types of content included programming teaching the user how to do magic tricks, Japanese idol sumo wrestling, sports, and 3D dating, among others. The service was terminated on June 20, 2012, a year after its inception. A Eurosport app launched in Europe and Australia on December 15, 2011, and worked similarly to the Nintendo Video app. It featured weekly episodes of Watts Zap and other compilation videos containing Eurosport content. The service was terminated on December 31, 2012, a year after its inception.
Swapnote
Swapnote (known as Nintendo Letter Box in Europe and Australia) is a messaging application for the Nintendo 3DS. Swapnote was released on December 21, 2011, in Japan and on December 22 in Europe, Australia and North America, via the Nintendo eShop. The application is free and is pre-installed on newer systems. It allows users to send hand-written/drawn messages to registered friends via SpotPass either or other users via StreetPass. The app also allows users to freely embed pictures and sounds into their messages.
On October 31, 2013, Nintendo abruptly suspended the Swapnote/Nintendo Letter Box SpotPass functionality after discovering minors were sharing Friend Codes with strangers who had exploited the messaging service to allegedly exchange pornographic imagery.
Mii Maker
Mii Maker is a system application that allows users to create Mii characters through either a selection of facial and body features, such as the nose, mouth, eyes, hair, among other, or by taking a photo using the system's cameras and auto-generate a personal Mii. Mii characters can also be added and shared by reading special QR codes with one of the cameras. It is also possible to import Mii characters from a Wii or a Wii U system. However, Mii created on Nintendo 3DS systems cannot be exported back to a Wii due to the addition of character parts in Mii Maker not present on the Wii's Mii Channel. This restriction, however, is not applied when exporting a Mii from a Nintendo 3DS to a Wii U system.
Activity Log
Activity Log is a system application that tracks game-play and keeps a record of which games have been played and for how long, as well as physical activity, such as counting every step taken while carrying a Nintendo 3DS using its built in pedometer. The feature encourages walking every day with the system in order to earn Play Coins, at a maximum of 10 each day at a rate of one per 100 steps, to a total of 300 coins. Play Coins can then be used with compatible games and applications to acquire special content and a variety of other benefits.
Other network features
Other network features of the Nintendo 3DS include the Nintendo Network, SpotPass and StreetPass. StreetPass Mii Plaza is a StreetPass application which comes pre-installed on every Nintendo 3DS system, while Nintendo Zone Viewer is a built-in application that detects and makes use of certified SpotPass hotspots. The service has since been discontinued.
PictoChat, the decentralized wireless messaging software introduced with the Nintendo DS and supported by Nintendo DSi for exchanging text and drawings, is not present on 3DS.
Games
Retail copies of games are supplied on proprietary cartridges called Nintendo 3DS Game Cards, which are packaged in keep cases with simple instructions. In Europe, the boxes have a triangle at the bottom corner of the paper sleeve-insert side. The triangle is color-coded to identify the region for which the title is intended and which manual languages are included. Unlike with previous Nintendo consoles, the complete software manual is only available digitally via the system's Home Menu. Software published by Nintendo and by some third parties come packaged with Club Nintendo points, which can be redeemed for special rewards. Retail and download-only games are also available for download in the Nintendo eShop. All Nintendo 3DS consoles are region locked (software purchased in a region can be only played on that region's hardware).
A total of 386.48 million Nintendo 3DS games have been sold worldwide , with 49 titles surpassing the million-unit mark. The most successful game, Mario Kart 7, has sold 18.94 million units worldwide.
Launch titles
The Nintendo 3DS launched in Japan with 8 games, in North America with 15 games and in Europe with 14 games. An additional thirty games were announced for release during the system's "launch window", which includes the three months after the system's launch date.
Augmented reality
AR Games is a compilation of several augmented reality mini-games and simple tools, which is pre-installed on every Nintendo 3DS, along with 6 paper cards that interact with certain games. Five of the six cards have a picture of a character on them, consisting of Mario, Link, Kirby, Pikmin, and Samus. The sixth one is a question mark box from the Super Mario Bros. series. Nintendo has also published downloadable versions of this card in larger sizes. By scanning the cards, real time graphics are augmented onto live footage. It is also possible to take 3D photos of Nintendo characters, using any to all 6 AR Cards, as well as their Miis.
Some AR cards are also compatible with other Nintendo 3DS games including Nintendogs + Cats, Kid Icarus: Uprising, Pokédex 3D Pro, Freakyforms: Your Creations, Alive!, and Tetris: Axis.
Face Raiders is another augmented reality application pre-installed on every Nintendo 3DS system. In order to start playing, the user must take pictures of peoples' faces. These faces then turn into enemies and attack the player, who must shoot them using the system's gyroscope. The background of the game is the rear camera's viewpoint. As people walk by in the background, the game takes their pictures from their faces, also adding them as enemies. It is also possible to collect faces from the system's image gallery, which is searched automatically for faces.
There are other Nintendo 3DS applications that similarly use the system's AR capabilities, such as Photos with Mario, Photos with Animal Crossing, Pokémon Dream Radar, and Spirit Camera: The Cursed Memoir.
Download Play
Download Play allows users to play local multiplayer games with other Nintendo 3DS systems using only one Game Card. Players must have their systems within wireless range (up to approximately 65 feet) of each other for the guest system to download the necessary data from the host system. Download Play on Nintendo 3DS systems is also backward compatible, meaning that it is also available for Nintendo DS games. Unlike Download Play on Nintendo DS, game data is stored on the system's SD card once downloaded to the guest system, no longer requiring a re-download for a future game session. Nintendo 3DS games can only transfer a maximum of 32 MB of data to other systems while in download play. Other forms of local multiplayer modes require each player to own the software that is currently being used.
Backward compatibility
In addition to its own software, the Nintendo 3DS is backward compatible with all Nintendo DS and Nintendo DSi software. Like the DSi and DSi XL, the Nintendo 3DS is incompatible with DS software that requires use of the Game Boy Advance port. Nintendo DS and DSi software cannot be played with 3D visuals on the 3DS. The original DS display resolutions are displayed in a scaled and stretched fashion due to the increased resolution of the 3DS's screens. If the user holds down the START or SELECT buttons upon launching Nintendo DS software, the emulated screens will be displayed in the Nintendo DS's native resolution, albeit smaller with black borders. On the Nintendo 3DS XL, this method yields a viewing size for DS games similar to their native sizes (due to the larger screen size of the XL), unlike on the original 3DS models, where the games appear to be shrunk.
Virtual Console
The Virtual Console service allows Nintendo 3DS owners to download and play games originally released for the Game Boy, Game Boy Color, Game Gear, NES, and exclusively for the New Nintendo 3DS models, Super NES. Virtual Console games are distributed over broadband Internet via the Nintendo eShop, and are saved to a removable SD card. Once downloaded, Virtual Console games can be accessed from the Home Menu as individual apps. The service was launched on June 6 in North America and June 7, 2011, in Japan and Europe as part of a system update.
Nintendo and Sega also launched the 3D Classics series, a selection of enhanced retro games for the Nintendo 3DS featuring updated stereoscopic graphics.
Non-gaming uses
The Louvre Museum in Paris contracted Nintendo to create a 3DS-based audiovisual visitor guide. Titled Nintendo 3DS Guide: Louvre, this guide contains over 30 hours of audio and over 1,000 photographs of artwork and the museum itself, including 3D views, and also provides navigation thanks to differential GPS transmitters installed within the museum. 3DS XLs pre-loaded with the guide are available for hire at the museum, and the software can also be purchased from the Nintendo eShop. Unlike most 3DS titles, the guide is not region locked.
Comparison
Reception
The Nintendo 3DS hardware has received largely positive reviews. IGN called its hardware design a "natural evolution of the Nintendo DSi system." CNET praised the device's 3D effect, while IGN called it "impressively sharp and clean", and impressively superior to its predecessors, although it was noted that the 3D effect only worked if the system was held at the right distance and angle. A common complaint was the 3DS's battery life; Engadget reported to get 3 hours of battery life from the system, while IGN reported 2 to 4.5 hours of play.
The Nintendo 3DS XL was very well received at launch. Reviewers generally recommended the console to new buyers of the Nintendo 3DS family, although not so much to current owners of a Nintendo 3DS. Kotaku mentioned it as "possibly the best portable gaming device ever...[and] a well-designed machine..." and that "it plays great games" while The Verge called it "the best portable gaming buy around right now." The Nintendo 3DS XL improves upon the battery life of the original 3DS. Kotaku claimed that the Nintendo 3DS XL's battery "lasts a cross-country flight.". Sam Byford of The Verge noted that the larger top screen makes more obvious problems with aliasing and low-resolution textures. He did, however, say that the 3D felt more immersive: "Where the 3DS felt like peering through a peephole into another world, the XL is almost like stepping through a door." On the other hand, Destructoid said the 3D effect on the XL was more subtle than on its predecessor. The Verge spoke positively of the build quality and design choices, saying the console improved on the original. A Destructoid reviewer said the 3DS XL was easier to use than the regular Nintendo 3DS, mainly due to his large hands. The Verge noted lowered sound quality from the original, the result of smaller speakers. Both The Verge and Gizmodo complained of low-quality cameras.
Sales
Pre-launch
Prior to its launch, Amazon UK announced that the Nintendo 3DS was their most pre-ordered video game system ever. Nintendo of America announced that the number of pre-orders were double the number of pre-orders for the Wii.
Launch
The system launched in Japan on February 26, 2011, and sold its entire allotment of 400,000 Nintendo 3DS units during its release, amid reports of major queues outside retailers and pre-order sellouts. On March 25, 2011, the system launched in Europe, selling 303,000 units during its first two days of its release. In the UK 113,000 3DS units were sold during its opening weekend, making it Nintendo's most successful hardware launch in the country to this day. According to the NPD Group, Nintendo sold just under 500,000 Nintendo 3DS units during the month of March 2011 in the US, with 440,000 Nintendo 3DS units sold in its first week of release. As of March 31, 2011, the 3DS had sold 3.61 million units, short of the 4 million Nintendo projected. The Nintendo 3DS is also the fastest selling console in Australia, with 200,000 units sold through 37 weeks of availability.
Price cut
Following the system's price cut of almost one third of its original price by the second quarter of 2011, sales saw an increase of more than 260 percent during the comparable 19-day time period in July. About 185,000 units were sold following a price cut on August 12. Nintendo sold more than 235,000 Nintendo 3DS systems in the United States in August, being the second best-selling dedicated game system for the month.
Approximately 8 months after its release, Nintendo of America announced that sales of the Nintendo 3DS had surpassed the original Nintendo DS in its first year, which was approximately 2.37 million units sold. During the 2011 holiday season, the Nintendo 3DS sold approximately 1.6 million units in Japan. By the end of 2011, Nintendo 3DS sales reached 4 million units sold in the United States. Overall, Nintendo sold 11.4 million Nintendo 3DS units worldwide, in 2011.
Subsequent sales
On September 30, 2013, Nintendo president Satoru Iwata announced that the Nintendo 3DS had sold more than 5 million units in Japan during the year of 2013. This mark was only surpassed by its predecessor, the Nintendo DS.
Following the launch of the Nintendo 2DS, Nintendo sold 452,000 units of the Nintendo 3DS family in the United States, during the month of October, double the previous month's sales. As such, it achieved its sixth consecutive month as the best-selling video game console in the US. Total Nintendo 3DS first-party software sales for the month hit more than 2 million units, the highest since December 2011. North American retailer Target reported that the Nintendo 3DS XL was among its top-sellers during the Black Friday. On November 29, 2013, Nintendo of France deputy general manager Philippe Lavoué announced that Nintendo 3DS life-to-date hardware sales stand at 2.15 million units in France, in which 30 percent account for Nintendo 2DS sales. It was also announced that the 3DS possesses a market share of 50 percent of all video game systems sold, and that Nintendo 3DS software sales rose from 850,000 to 1,700,000 year-over-year in the region. According to the NPD Group, Nintendo sold around 770,000 units of the Nintendo 3DS family in November in North America, pushing the lifetime to nearly 10.5 million units in the region. On December 19, 2013, MCV reported that lifetime Nintendo 3DS family sales in the United Kingdom had hit 2 million units, making it the best-selling console of the year in the region.
By January 2014, Nintendo had sold 900,000 units in Spain. The fourth quarter of 2014 saw the release of the New Nintendo 3DS in Japan and Australia. Although having upgraded hardware, a few exclusive titles, and being capable of running Super NES games for the Virtual Console, it is not treated as a new generation of console. It is considered to be part of the 3DS family, and is therefore included in these sales figures.
The first quarter of 2015 saw the release of the New Nintendo 3DS, part of the 3DS family and thus counted among these sales figures, in Europe and North America.
, Nintendo reports 75.94 million units have been shipped worldwide, of which 25.26 million were shipped to Japan, 26.90 million were shipped to the Americas, and 23.78 million were shipped to other territories including Europe.
Health concerns
Nintendo has publicly stated that the 3D mode of the Nintendo 3DS is not intended for use by children ages six and younger, citing possible harm to their vision. Nintendo suggests that younger players use the device's 2D mode instead, although the American Optometric Association has assured parents that 3D gaming in moderation would not be harmful for children. Additionally, the 3DS may help in screening children before the age of 6 who have depth related vision problems according to Dr. Michael Duenas, associate director for health sciences and policy for the American Optometric Association, and Dr. Joe Ellis, the president of the optometrists' association. However, Dr. David Hunter, a pediatric ophthalmologist affiliated with the American Academy of Ophthalmology believes that it is largely speculative whether a child who has problems perceiving depth in real life would react to a 3DS in any way that parents would recognize as indicating any problems with depth perception. Duenas asserted that Nintendo's vague warning that "there is a possibility that 3-D images which send different images to the left and right eye could affect the development of vision in small children," was not specifically backed up by any scientific evidence, and that it was motivated by preventing possible liability rather than safeguarding against realistic harm.
The system's parental controls, safeguarded by a PIN, allow parents to disable autostereoscopic effects on systems intended for use by young children. Playing games in 3D has been suspected of causing headaches among some gamers.
Nintendo of America president Reggie Fils-Aimé partially cited these concerns as one of the influences of the creation of the Nintendo 2DS, an entry-level version of the Nintendo 3DS systems lacking 3D functionality.
Legal issues
In 2011, 58-year-old former Sony employee Seijiro Tomita sued Nintendo for infringing a patent on the 3D screen that obviates the need for 3D glasses. On March 13, 2013, a United States federal jury ordered Nintendo to pay him US$30.2 million in damages. However, on August 7, 2013, that amount was reduced by 50% to US$15.1 million because the initial figure was, according to Judge Jed Rakoff, a federal judge, "intrinsically excessive" and "unsupported by the evidence presented at trial." On December 11, 2013, it was decided by Judge Rakoff that Nintendo pay 1.82% of the wholesale price of each unit sold to Tomita. On March 17, 2018, the United States Appeals Court determined Nintendo had not violated Tomita's patent.
On July 17, 2015, Nintendo won a patent suit filed against eight of its handheld consoles, including the 3DS. The suit was originally filed by the Quintal Research Group after it secured a patent for a "computerized information retrieval system" in 2008.
See also
List of Nintendo DS and 3DS flash cartridges
Citra, a Nintendo 3DS emulator
Notes
References
External links
Official Nintendo 3DS website
Official North American Nintendo 3DS website
Official European Nintendo 3DS website
Official Australian Nintendo 3DS website
2010s toys
Backward-compatible video game consoles
Eighth-generation video game consoles
Handheld game consoles
IQue consoles
Products introduced in 2011
Products and services discontinued in 2020
|
15706961
|
https://en.wikipedia.org/wiki/Alexandria%20Senior%20High%20School%20%28Louisiana%29
|
Alexandria Senior High School (Louisiana)
|
Alexandria Senior High School is a public secondary school located in Alexandria, Louisiana, United States. The school serves about 1,300 students in grades 9 to 12 in the Rapides Parish School Board district.
Alexandria Senior High (commonly referred to as "ASH") first opened in fall 1969. A few months before it opened, a makeshift student council was elected by the local junior and senior high school students that would be joining to create ASH's student body. This advisory board acted as a Student Council until one could be elected. During its first meeting, the council selected the school colors of purple and gold. The Council went on to choose its mascot, the Trojan. In the 2010–2011 school year, Alexandria Senior High was the second largest school in Rapides Parish.
Athletics
The high schools sports teams, the ASH Trojans, are members of LHSAA. ASH is scheduled to move to the LHSAA's top classification, Class 5A, starting in August 2013. The Trojans competed in the second highest classification, 4A, from 1991 to 1992 through 2012–13, when the school was reclassified into 5A, the highest classification. ASH is currently a member of District 2-5A with Rapides Parish rival Pineville, along with Natchitoches Central, Ouachita, Ruston, West Monroe and West Ouachita.
Sports offered:
American football, swimming (boys and girls), golf, cross country, soccer (boys and girls), powerlifting (boys and girls), basketball (boys and girls), tennis (boys and girls), baseball, softball, boys' and grils' track and field (outdoor and indoor), cheerleading, band (Drumline), archery and danceline.
Alexandria Senior High School principals
Since 1969, ASH has had nine principals:
R. Raymond Bamburg - 1969-1983
Aubrey Sanders - 1983–1990, 1991–1994
Lyle Hutchinson - 1990–1991, 1994–1998
Rita Guinn - 1998 - 2000
Joe Moreau - 2001 - 2007
Billy Albritton - 2007–2010
Duane Urbina - 2010–2017
Jonathan Garret - 2017–2019
Jody Goodman- 2019–present
Notable alumni
Chris Boniol (Class of 1990), American football placekicker
DJ Chark (Class of 2014), American football wide receiver
Demar Dotson (Class of 2004), American football player
Kellie and Kristen Fuselier (Class of 2007), Christian musicians
Nic Harris (Class of 2005), American football linebacker
Craig Nall (Class of 1997), American football quarterback
Juan Pierre (Class of 1995), professional baseball player
Lamar White Jr. (Class of 2000), blogger and political activist
References
External links
Alexandria Senior High School website
ASH American football website
Buildings and structures in Alexandria, Louisiana
Educational institutions established in 1969
Public high schools in Louisiana
Schools in Rapides Parish, Louisiana
1969 establishments in Louisiana
|
39449413
|
https://en.wikipedia.org/wiki/Mingw-w64
|
Mingw-w64
|
Mingw-w64 is a free and open source software development environment to create Microsoft Windows PE applications. It was forked in 2005–2010 from MinGW (Minimalist GNU for Windows).
Mingw-w64 includes a port of the GNU Compiler Collection (GCC), GNU Binutils for Windows (assembler, linker, archive manager), a set of freely distributable Windows specific header files and static import libraries which enable the use of the Windows API, a Windows native build of the GNU Project's GNU Debugger, and miscellaneous utilities.
Mingw-w64 can be run either on the native Microsoft Windows platform, cross-hosted on Linux (or other Unix), or "cross-native" on MSYS2 or Cygwin. Mingw-w64 can generate 32 bit and 64-bit executables for x86 under the target names and .
History
In 2005, Mingw-w64 was created by OneVision Software under clean room design principles, since the original MinGW project was not prompt on updating its code base, including the inclusion of several key new APIs and the much needed 64-bit support. In 2008, OneVision then donated the code to Kai Tietz, one of its lead developers, under the condition that it remains open source. It was first submitted to the original MinGW project, but refused under suspicion of using non-public or proprietary information. For many reasons, the lead developer and co-founder of the MinGW-w64 project, Kai Tietz, decided not to attempt further cooperation with MinGW.
MinGW-w64 provides a more complete Win32 API implementation, including:
Better C99 support
POSIX Threads (pthreads) support (including the possibility to enable C++11 thread-related functionality in GCC's libstdc++)
GCC multilib, which allows users to install 32-bit and 64-bit libraries in parallel
Unicode entry point (wmain/wWinMain)
DDK (from ReactOS)
DirectX (from Wine)
Large file support
Win64 support
Structured Exception Handling (SEH) instead of DWARF or sjlj on x86-64 (from gcc 4.8+)
Some useful tools such as gendef (an improved version of MinGW's pexports utility), and widl (an MIDL compiler from Wine).
Additionally, the Mingw-w64 project maintains winpthreads, a wrapper library similar to pthreads-win32, with the main difference that it allows GCC to use it as a threads library resulting in functional C++11 thread libraries <thread>, <future>, and <mutex>.
MSYS2
MSYS2 ("minimal system 2") is a software distribution and a development platform for Microsoft Windows, based on Mingw-w64 and Cygwin, that helps to deploy code from the Unix world on Windows. It plays the same role the old MSYS did in MinGW.
MSYS2 shares this goal of bringing Unix code to Windows machines with several other projects, most notably Cygwin and Windows Subsystem for Linux (WSL). WSL lets Linux ELF binaries run on Windows, with limited support for kernel calls and significant limitations in graphical applications. Cygwin provides a full POSIX environment (as a windows DLL) in which applications, compiled as Windows EXEs, run as they would under Unix.
Instead of providing a full environment like Cygwin does, MSYS2 tasks itself with being a development and deployment platform.
There is a main MSYS2 environment (similar to, and in fact derived from, Cygwin's emulation code) with package manager and standard Unix system tool. This way, when managing MSYS2 itself, standard Unix tools can be used unmodified by using the emulated environment. It's also possible to install build tools in the MSYS2 emulated environment in case the user wants to build software that depends on the POSIX emulation layer instead of the native API.
In addition, four environments are provided containing native compilers, build tools and libraries that can be directly used to build native Windows 32-bit or 64-bit programs. The final programs built with the two native environments don't use any kind of emulation and can run or be distributed like native Windows programs. The environments are MINGW64 and MINGW32 (the original MinGW-w64 environments using gcc, msvcrt, and libstdc++), UCRT64 (adaptation of MINGW64 to ucrt), and CLANG64 (adaptation of UCRT64 to clang and libc++). While Cygwin also provides MinGW-w64 compilers and libraries, the set of available libraries is smaller, and they are not as easily managed due to not being placed in separate prefixes.
The main MSYS2 environment provides a package manager (Pacman from Arch Linux), a bash shell, and other Unix programs. It uses a runtime library msys-2.0.dll (~20MB) that is derived from the Cygwin library cygwin1.dll, and is updated regularly to keep track of the Cygwin development. It is intended as a development environment, one that developers can manage (using pacman) and run their tools with. Features judged unnecessary for development are removed.
As with Cygwin, MSYS2 supports path translation for non-MSYS2 software launched from it. For example one can use the command to launch an editor that will open the file with the Windows path .
MSYS2 and its bash environment is used by Git and GNU Octave for their official Windows distribution.
Compiler
Most languages supported by GCC are supported on the Mingw-w64 port as well. These include C, C++, Objective-C, Objective-C++, Fortran, and Ada. The GCC runtime libraries are used (libstdc++ for C++, libgfortran for Fortran, etc.). A packaging of LLVM's clang to mingw-w64 is also provided by MSYS2. It supports ARM for Windows ( and ).
Binaries (executables or DLLs) generated with different C++ compilers (like Mingw-w64 GCC and Visual Studio) are in general not link compatible due to the use of different ABIs and name mangling schemes caused by the differences in C++ runtimes. However, compiled C code is link compatible. Clang is an exception, as it mostly supports MSVC's C++ ABI on Windows.
The binutils documentation has up-to-date information about its handling of various windows-specific formats and special tools for doing so.
References
External links
MSYS2
MXE - Makefiles to build MinGW on Unix and many common dependencies libraries targeting Win32/64, pre-built packages available
2005 software
C (programming language) compilers
C++ compilers
Cross-compilers
Fortran compilers
Free compilers and interpreters
Public-domain software
|
55828104
|
https://en.wikipedia.org/wiki/National%20Cybersecurity%20and%20Communications%20Integration%20Center
|
National Cybersecurity and Communications Integration Center
|
The National Cybersecurity and Communications Integration Center (NCCIC) is part of the Cybersecurity Division of the Cybersecurity and Infrastructure Security Agency, an agency of the U.S. Department of Homeland Security. It acts to coordinate various aspects of the U.S. federal government's cybersecurity and cyberattack mitigation efforts through cooperation with civilian agencies, infrastructure operators, state and local governments, and international partners.
It is also responsible for coordinating national response to significant cyber incidents in accordance with the National Cyber Incident Response Plan (NCIRP).
The NCCIC consists of four branches:
NCCIC Operations & Integration (NO&I)
United States Computer Emergency Readiness Team (US-CERT)
Industrial Control Systems Cyber Emergency Response Team (ICS-CERT)
National Coordinating Center for Communications (NCC)
According to the National Cybersecurity and Communications Integration Center’s (NCCIC), their mission is to "reduce the risk of systemic cybersecurity and communications challenges in our role as the Nation’s flagship cyber defense, incident response, and operational integration center."
History
NCCIC was created in March 2008, and it is based on the requirements of National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD-54/HSPD-23), reporting directly to the DHS Secretary. The NCC is tasked with protecting the U.S. Government's communications networks. The Center monitors, collects and shares information on systems belonging to NSA, FBI, DoD, and DHS.
The first Director appointed to head the Center was Rod Beckstrom, an entrepreneur and co-author of The Starfish and the Spider. On March 5, 2009, Beckstrom tendered his resignation as the Director of National Cybersecurity Center. According to the Washington Post, Beckstrom resigned, "...due to a lack of resources and because there were efforts underway to fold his group – as well as the division Reitinger is joining – into a facility at the NSA." On March 11, 2009, Phil Reitinger, then at Microsoft, was appointed to the position.
On October 30, 2009, DHS Secretary Janet Napolitano opened the National Cybersecurity and Communications Integration Center (NCCIC). The NCCIC combined two DHS organizations: the United States Computer Emergency Readiness Team (US-CERT) and the National Coordinating Center for Telecommunications (NCC). It also integrates the efforts of the National Cybersecurity Center (NCC), the DHS Office of Intelligence and Analysis (I&A), and private-sector partners of DHS.
US President's Cyber Security Policy Review
In June 2009, the White House published a Cyber Security Policy Review; however, the NCC was not explicitly mentioned in that document.
National Program Office
In coordination with the United States Department of Commerce, the White House cybersecurity office announced on January 7, 2011 that it will create an office within the commerce department that is devoted to helping the development of technologies or platforms that will eventually allow sensitive online transactions to be carried out with greater levels of trust. The new office is called the National Program Office. Its primary duty is to coordinate the federal activities necessary to carry out the National Strategy for Trusted Identities in Cyberspace (NSTIC), a White House initiative dedicated to making the Internet a more secure environment for consumers.
References
External links
https://www.us-cert.gov/nccic
National Cybersecurity and Communications Integration Center
Computer security organizations
|
276208
|
https://en.wikipedia.org/wiki/Masters%20of%20Deception
|
Masters of Deception
|
Masters of Deception (MOD) was a New York-based group of hackers, most widely known in media for their exploits of telephone company infrastructure and later prosecution.
Origin of Masters of Deception
MOD's initial membership grew from meetings on Loop-Around Test Lines that led to legendary collaborations to hack RBOC phone switches and the various minicomputers and mainframes used to administer the telephone network. They successfully remained underground using alternative handles to hide even their true hacker identities.
Acid Phreak founded the Masters of Deception with Scorpion and HAC. The name itself was, among other things, a mockery of Legion of Doom (LOD), as 'M' is one letter up in the alphabet from 'L', although the name originally was a flexible acronym that could be used to identify membership in situations where anonymity would be the best course of action. It could stand for "Millions of Dollars" just as easily as "Masters of Deception."
It is claimed that the mockery of the LOD name was a statement to the underground that LOD had lost its direction. Several LOD members were close friends of MOD who had been raided and indicted by the government, causing the majority of those who remained to drop out of the underground for safety reasons. In their absence, LOD largely fell into disarray causing the disagreement and disillusionment that led Phiber Optik to align himself with MOD in an effort to restore the direction of the spirit of underground hacking.
Members of MOD
The original Masters of Deception included: Mark Abene ("Phiber Optik"), Paul Stira ("Scorpion"), Elias Ladopoulos ("Acid Phreak"), HAC, John Lee ("Corrupt") and Julio Fernandez ("Outlaw").
Additional members who have remained anonymous include: Supernigger (also of DPAK), Wing, Nynex Phreak, Billy_The_Kid, Crazy Eddie, The Plague, ZOD, Seeker, Red Knight (who was also a member of Cult of the Dead Cow), Lord Micro, n00gie and peaboy (a.k.a. MCI Sprinter).
Philosophy
Masters of Deception operated differently in many respects to previous hacking groups. Although they openly shared information with each other, they took a controversial view on sharing information outside the group. It was believed that access to MOD's knowledge should be earned via degrees of initiation and a proven respect for the craft, rather than releasing powerful information into the wild where it could be used for nefarious purposes.
A demonstration of responsibility on the part of the initiate was required. This informal compartmentalized protection of more sensitive knowledge was a structure originally employed by LOD in the 1980s, rather successfully. According to Lex Luthor, "I realized early on that only certain people can be trusted with certain information, and certain types of information can be trusted to no one. Giving out useful things to irresponsible people would inevitably lead to whatever thing it was being abused and no longer useful. I was very possessive of my information and frequently withheld things from my articles."
Fall of MOD
As a result of a major nationwide investigation by a joint FBI/Secret Service task force, five of MOD's members were indicted in 1992 in federal court. The case was prosecuted by the U.S. Attorney's Office for the Southern District of New York by Assistant U.S. Attorneys Stephen Fishbein and Geoffrey S. Berman. Within the next six months (in 1993), all five pleaded guilty and were sentenced to either probation or prison. After the sentencing of Abene, 2600: The Hacker Quarterly, Winter 1993-94, had on its cover a rag doll labeled "BERMAN" stabbed by a dagger.
Media
Masters of Deception have appeared in many magazine and newspaper articles, and the individual members have appeared on television numerous times.
Village Voice July 24, 1990. Cover Article by Julian Dibbel.
Singer/songwriter Poe referenced the MOD with the phrase "MOD are you out there?" from her 1995 song "Hello".
Josh Quittner, Masters of Deception: The Gang That Ruled Cyberspace ()
Gang War in Cyberspace Wired 2.12
This American Life Nov. 24, 1995. Small Scale Sin Act Three profiles Eli Ladopoulos after his release from prison.
@Large - The Strangest Case of the World's Biggest Internet Invasion ()
References
External links
The Book of MOD, Vol. III
Computer Underground Digest, Volume 5, Issue 87
Gang War in Cyberspace Wired 2.12
Notorious M.O.D. Wired 9.06
Hacker groups
|
994579
|
https://en.wikipedia.org/wiki/Paderborn%20University
|
Paderborn University
|
Paderborn University () is one of the fourteen public research universities in the state of North Rhine-Westphalia in Germany. It was founded in 1972 and 20,308 students were enrolled at the university in the wintersemester 2016/2017.
It offers 62 different degree programmes.
The university has several winners of the Gottfried Wilhelm Leibniz Prize awarded by the German Research Foundation (DFG) and ERC grant recipients of the European Research Council. In 2002, the Romanian mathematician Preda Mihăilescu proved the Catalan conjecture, a number-theoretical conjecture, formulated by the French and Belgian mathematician Eugène Charles Catalan, which had stood unresolved for 158 years.
The University Closely Collaborates with the Heinz Nixdorf Institute, Paderborn Center for Parallel Computing and two Fraunhofer Institutes for research in Computer Science, Mathematics, Electrical Engineering and Quantum Photonics.
In 2018, world record for "optical data transmission at 128 gigabits per second" was achieved at the Heinz Nixdorf Institute of the University of Paderborn. The academic ranking of world universities 2018, popularly known as "shanghai rankings" placed the university in the ranking bracket 50-75 among mathematics departments worldwide.
Campus
Paderborn University has two campuses:
The main campus and
The campus on Fürstenallee
Main campus
The main campus is located at Warburger Straße in Paderborn. Paderborn University owns two student halls of residence, both of which are just off the main campus. The main campus also houses the library.
International Office
The international office of Paderborn University is interconnected with over 140 partner universities worldwide and offers exchange programs. The international office works closely with the student organization Eurobiz e.V. which looks after incoming exchange students.
Fürstenallee
The Fürstenallee campus is located 5 km from the main campus and is connected to the main campus via the 'uni-line' bus. Some academic activities of the computer science and Systems engineering departments are held at the Fürstenallee campus. Next to the Fürstenallee building is the world's biggest computer museum, the Heinz Nixdorf Museum Forum. The Fürstenallee campus houses the research centers such as Heinz Nixdorf Institute, Cooperative Computing and Communication Laboratory (C-Lab) and Software quality lab (S-lab).
Academics
In 2006, the computer science program was ranked among the top 3 programs in the most comprehensive and detailed ranking of German universities by the Centre for Higher Education Development (CHE) and the German weekly news magazine "Die Zeit". In the same year, the university was ranked among the leading institutions in terms of gaining research funds in the areas of electrical engineering, computer science and systems engineering by the German Research Foundation.
The interdisciplinary research centers at the university include Heinz Nixdorf Institute, Paderborn center for Parallel Computing, Paderborn Institute for Scientific Computation, Cooperative Computing and Communication Laboratory (C-Lab) and Software quality lab (S-lab). RailCab is a research project by Paderborn University. Its purpose is the examination of the use of linear engines for the propulsion of autonomous, rail mounted vehicles.
See also
List of early modern universities in Europe
References
External links
Website of the University
Educational institutions established in 1972
1972 establishments in Germany
Universities and colleges in North Rhine-Westphalia
|
5042421
|
https://en.wikipedia.org/wiki/Rudy%20Bukich
|
Rudy Bukich
|
Rudolph Andrew Bukich (September 15, 1930 – February 29, 2016) was an American football player, a quarterback in the National Football League from 1953 to 1968. Known as "Rudy the Rifle" for his uncommon arm strength, he tied an NFL record with 13 consecutive pass completions in the season. One year later, he was the second-leading passer in the league. He played college football at the University of Southern California, after transferring from the University of Iowa.
High school career
Born and raised in St. Louis, Missouri, Bukich was the son of Croatian immigrants. He was starting quarterback in his senior year at Roosevelt High School, a team that did not win a game. Bukich played one game as wingback when Roosevelt tried to upset eventual league champions Cleveland High School, St Louis by attempting to surprise them by playing the single wing.
College career
As a freshman, Bukich played at the University of Iowa before transferring to the University of Southern California in Los Angeles. During his senior year in 1952, USC played in the Rose Bowl on New Year's Day. After the Trojans' primary passer, All-American halfback Jim Sears, was sidelined early in the first quarter with a broken leg, Bukich came in and conducted a drive, completing all but two of his passes, that resulted in the only score of the game, and USC defeated Wisconsin, 7–0. Bukich was selected as the Most Valuable Player in the game, and after his career, he was inducted into the USC Trojan Hall of Fame and the Rose Bowl Hall of Fame (2004).
Professional career
Bukich was selected in the second round of the 1953 NFL Draft by the Los Angeles Rams. He later played for the Washington Redskins, Chicago Bears, and the Pittsburgh Steelers. He missed the and seasons while serving in the U.S. Army.
Bukich's greatest performances were during his second stint with the Bears in the 1960s. He was a reserve quarterback with the Bears in 1963 when they won the NFL championship (Bill Wade was the starter throughout the season). Bukich replaced Wade during Week Four against the Baltimore Colts after Wade completed just 5 of 21 passes. Bukich played the remainder of the game and completed 6 of 7 passes, including a pass to Ronnie Bull for a touchdown that was the deciding margin of victory.
Post-playing career
After his playing days Bukich was a real estate developer in southern California. In his later years he was diagnosed with chronic traumatic encephalopathy (CTE), and he died at age 85 in San Diego in 2016. He was buried at Miramar National Cemetery in San Diego.
References
External links
Legacy.com – Rudy Bukich
1930 births
2016 deaths
USC Trojans football players
Los Angeles Rams players
Chicago Bears players
Pittsburgh Steelers players
Washington Redskins players
Players of American football from St. Louis
American people of Croatian descent
American football quarterbacks
Iowa Hawkeyes football players
Burials at Miramar National Cemetery
|
9452372
|
https://en.wikipedia.org/wiki/Technische%20Universit%C3%A4t%20Ilmenau
|
Technische Universität Ilmenau
|
The Technische Universität Ilmenau (TU Ilmenau) is a German public research university located in Ilmenau, Thuringia, Germany. Founded in 1894, it has five academic departments (faculties) with about 7,200 students.
Introduction
Background
Research and education at the Technische Universität Ilmenau is focused on engineering with strong links to economics and natural sciences. It is the only university in the federal state of Thüringen with the title "Technische Universität". The university began its life in 1894 as the "Thüringisches Technikum", a private training college. This took on the status of "Hochschule für Elektrotechnik" (HfE) before becoming a "Technische Hochschule" (TH) and in 1992 being accorded the title of "Technische Universität" (TU).
Academics
TU Ilmenau offers degrees in technology, science, economics and media. These all also form part of the interdisciplinary media subjects which are a more recent development and combine technology, economics, law and social studies.
The 7200 or so students (at the last count) include about 1650 who come from outside Germany. The courses they take lead to Bachelor's and/or master's degrees in which the subjects tend to be drawn from a number of disciplines within the overall groups of Engineering, Mathematics with Science, and Economics with Social Studies.
Among the distinguishing features of the TU Ilmenau are personal care for students from professors, tutors and student mentors; a campus with modern buildings only short distances apart; a variety of social activities and social support; many student associations as well as diverse cultural and sports activities.
The Fraunhofer Institute of Digital Media Technology (IDMT), is located near the TU Ilmenau campus. It's well known for their audio processing technology, media compression, and video processing teams.
Departments
Department of Electrical Engineering and Information Technology
Department of Computer Science and Automation
Department of Mechanical Engineering
Department of Mathematics and Natural Science
Department of Economic Sciences and Media
Department of Electrical Engineering and Information Technology
The Department of Electrical Engineering and Information Technology has its roots in the Faculties of Heavy Current Technology and Light Current Technology of the erstwhile engineering college, the "Hochschule für Elektrotechnik" (HfE). It comprises four institutes as well as the Inter-Faculty Institute for Materials Technology and is in charge of the following graduate courses of study: Electrical Engineering and Information Technology and Media Technology, as well as the further education course of Telecommunications Manager. The inventor of the MP3 music encoding format Karlheinz Brandenburg is one of the professors at this Faculty.
Department of Computer Science and Automation
The Department of Computer Science and Automation has its roots in the Institutes of Control Engineering and Electromedical and Radiological of the HfE as well as in the scientific fields of Engineering Informatics and Computer Engineering of the former TH Ilmenau. This faculty has five institutes including 20 departments and the junior professorship "Automation Technology" and is in charge of the course of study of "Biomedical Engineering", "Computer Science", "Computer Engineering" and "Technical Cybernetics and Systems Theory".
Department of Mechanical Engineering
The Department of Mechanical Engineering was founded as Faculty of Precision Mechanics and Optics at the HfE. It comprises 19 departments as well as the junior professorship "Design of mechatronics drives" and is in charge of the graduate courses of study of Mechanical Engineering, Mechatronics, Automotive Engineering, Optronics, Teacher Training for Vocational School and Materials Science taught at the Inter-Faculty Institute for Materials Technology. Complementary further-education courses offered include Applications of Light and Innovative Engineering Design for Industrial Machinery and Equipment (shared course with the Friedrich-Schiller-Universität Jena).
Department of Mathematics and Natural Science
The Department of Mathematics and Natural Science has emerged from the Faculty of Mathematics, Natural Science and Technical Basic Sciences of the HfE. At present, it comprises the Institutes of Mathematics, Physics, Chemistry and Biotechnique as well as Media and Communications. It is in charge of the graduate courses of study of Mathematics, Technical Physics and Applied Media Science. Furthermore, it is responsible for the basic training of the students required for other courses of study in mathematics, physics and chemistry.
Department of Economic Sciences and Media
The Department of Economic Sciences and Media opened in 1990/91 is the youngest of all faculties at the university. The course of study of Business Informatics has been offered since 1988, and in 1990, the course of study of Industrial Engineering and Management was added. This faculty has four institutes including 15 departments and is in charge of the graduate courses of study of Commercial Information Technology, Industrial Engineering and Management and Media Economics. In the field of further education, it is responsible for the postgraduate course of Economic and Technical Information.
Research
Research in Ilmenau is carried out at all stages: theory, application of the theory, prototype testing and transfer to industrial application. Because the TU relies upon interdisciplinary work across faculty boundaries, and brings together many skills thereby, the following highly competitive research activities have been established:
Mobile communications
Nano-engineering
Precision engineering, instrumentation and measurement
Technical and biomedical prosthetic systems
Drive technology, energy and environmental engineering
Digital media technology
The university has a major centre contributing greatly to its research performance, the ZMN, Centre for Micro- and Nanotechnology.
So that results achieved in applied research can be transferred rapidly to industrial use, and so that spin-off companies are founded by the university and new partners found for collaborative projects, the university has set up public-private partnerships on new models, with the university taking a seat on the management boards of industrial companies. This concept is underlain by the entities known as “TU Ilmenau Service GmbH” and the “Technologiegesellschaft Thüringen mbH & Co. KG”.
The university is actively participating in the restructuring and development of the region (“Technologieregion Ilmenau-Arnstadt”). It also contributes to regional planning with its thinking on the encouragement of a high-tech periphery to the campus itself. There is a large number of innovative technological companies which have taken root in the immediate area of the university. With the “Energietechnisches Zentrum Thüringen” (Energy Engineering Centre for Thuringia), the TU Ilmenau is also steering its research strategy into energy engineering. Here the intention is to unite the academic strength of the University in energy engineering and management with the interest of other Thuringian enterprises and institutes.
National and International Networking
The Technische Universität Ilmenau is an active partner in the scientific-technological just as economic promotion of the Ilmenau Technological Development Area. In addition to this, it seeks to gain wide reputation on both a national and international scale. Considering educational export as one its main tasks, the university supports the international exchange of its students and collaborators on the basis of programmes set up for this purpose.
The Technische Universität Ilmenau strives to increase the number of foreign students and, therefore, promotes the cultural education as an important aspect of an ever increasing international competence requested.
Every two years the Initiative Solidarische Welt Ilmenau e.V. hosts ISWI (International Student Week Ilmenau) at the TU Ilmenau. It is an International Conference for students from all around the world. It aims to foster tolerance, understanding among nations and an international attitude. The TU Ilmenau runs we4you, which is an organization to help and welcome the international students in Ilmenau.
TU Ilmenau in Thuringian scientific and technological culture
The University is the most important employer in Ilmenau. It is one of the 4 universities in Thuringia, the others being the University of Erfurt, the Bauhaus University of Weimar, and the Friedrich Schiller University of Jena. It is now the most important centre of science in Thuringia, and intensive cooperations with the TU Ilmenau occur.
People
Faculty
Kai-Uwe Sattler – President
Karlheinz Brandenburg – Electrical Engineer and Mathematician
Michael Roth (1936 – 2019) – Engineer
Horst Sachs (1927 – 2016) – Mathematician
See also
Conference of European Schools for Advanced Engineering Education and Research
References
External links
Technische Universität Ilmenau
Technische Universität Ilmenau
Educational institutions established in 1894
1894 establishments in Germany
Ilmenau
Universities and colleges in Thuringia
|
1479333
|
https://en.wikipedia.org/wiki/Balloon%20help
|
Balloon help
|
Balloon help is a help system introduced by Apple Computer in their 1991 release of System 7.0. The name referred to the way the help text was displayed, in "speech balloons", like those containing words in a comic strip. The name has since been used by many to refer to any sort of pop-up help text.
The problem
During the leadup to System 7, Apple studied the problem of getting help in depth. They identified a number of common questions, such as Where am I?, How do I get to...?, or worse, Why is that item "grayed out"?. In the context of computer use they identified two main types of questions users asked: What is this thing? and How do I accomplish...?. Existing help systems typically didn't provide useful information on either of these topics, and were often nothing more than the paper manual copied into an electronic form.
One of the particularly thorny problems was the What is this thing? question. In an interface that often included non-standard widgets or buttons labeled with an indecipherable icon, many functions required the end user referring to their manual. Users generally refused to do this, and ended up not using the full power of their applications since many of their functions were "hidden". It was this problem that Apple decided to attack, and after extensive testing, settled on Balloon Help as the solution.
Apple's solution for How do I accomplish...? was Apple Guide, which would be added to System 7.5 in 1994.
Mechanism
Balloon help was activated by choosing Show Balloon Help from System 7's new Help menu (labelled with a Balloon Help icon in System 7, the Apple Guide icon in System 7.5, and the word Help in Mac OS 8). While balloon help was active, moving the mouse over an item would display help for that item. Balloon help was deactivated by choosing Hide Balloon Help from the same menu.
The underlying system was based on a set of resources included in application software, holding text that would appear in the balloons. The balloon graphics and resizing were supplied by the operating system itself. The balloon content when displayed in text typically was sourced entirely from resources, as they could be added fairly easily using Apple's Rez resource compiler or third-party software like Resourcerer. Apple also supplied a custom editor application to simplify the process, which displayed a list of only those objects that required balloons, and edited the text inside a balloon shape to give the developer a somewhat rough idea of how the resulting balloon would be displayed. Additionally, there was a system level API that could be utilized by the application programmer to directly create and display balloons containing text, graphics, or a mixture of both.
The engine would automatically display the proper balloon based on the mouse location and the item's current state. It also positioned the balloon using an algorithm designed to keep it from covering the objects being examined and adjusted the cartouche to point appropriately. Help text for most common UI elements, such as the Close Box on a window, was built into the system. Developers could also include balloons for their application icon itself, allowing users to identify an unknown application in the Finder without launching it.
Developers were encouraged to not just name an object, but to describe its function and explain its state. For instance, for the Copy menu command Apple suggested the detailed "Copies the selected text onto the clipboard", as well as a second version that added "Not available now because there is no selection". This feature explained to users why a particular menu item was disabled.
Legacy
Microsoft subsequently introduced the similar "tooltips" in Windows 95, which serves a similar purpose, but they are generally smaller and appear without being specifically turned on. A similar system called "help tags" was used in OPENSTEP and retained for .
The balloon help concept has since been adopted as an optional alternative to tooltips in later versions of Microsoft Windows, such as , which uses balloons to highlight and explain aspects of various programs or operating system features (Balloons in msdn). Balloon help is also highly visible in the Squeak Smalltalk environment, in the Enlightenment window manager, and in the AmigaOS's MUI.
Incidentally, Microsoft was able to add their own embodiment of Balloon help by acquiring the original patent among many purchased from Apple Computer in the early 1990s. That first, and original patent is described in "Method of calculating dimensions and positioning of rectangular balloons" filed in 1991.
References
Macintosh operating systems user interface
Online help
fr:Bulle d'aide
|
57429688
|
https://en.wikipedia.org/wiki/High-voltage%20transformer%20fire%20barriers
|
High-voltage transformer fire barriers
|
High-voltage transformer fire barriers, or transformer firewalls, transformer ballistic firewalls, transformer blast walls, are outdoor countermeasures against cascading failures in a national electric grid. The purpose of these barriers, like common fire barriers in building construction, is compartmentalisation of transformer fires, and compartmentalisation of transformer and bushing explosions―in which the fuel source of both fires and explosions is the transformer oil. Without compartmentalisation, one ruptured transformer could start its neighbouring transformer on fire and thus create a domino effect that would affect the surrounding electric grid, particularly during peak times.
High-voltage transformer fire barriers are typically located in electrical substations, but may also be attached to buildings, such as valve halls or manufacturing plants with large electrical distribution systems, such as pulp and paper mills. Outdoor transformer fire barriers that are attached at least on one side to a building are referred to as wing walls. At times, high-voltage transformers can be located immediately outside and sometimes inside of buildings, requiring higher fire-resistance ratings than other fire compartments in a building.
Voluntary recommendations by NFPA 850
The primary North American document that deals with outdoor high-voltage transformer fire barriers is NFPA 850. NFPA 850 outlines that outdoor oil-insulated transformers should be separated from adjacent structures and from each other by firewalls, spatial separation, or other approved means for the purpose of limiting the damage and potential spread of fire from a transformer failure.
Alternatives or enhancements to transformer fire barriers
The following may be used in place of or in addition to transformer fire barriers, depending on the design goals.
Automatic fire suppression systems
Fire protection water spray systems are used to cool a transformer to prevent damage if exposed to radiation heat transfer from a fire involving oil released from another transformer that has failed.
Transformer Fast Depressurization Systems (FDS)
Passive mechanical systems designed to depressurize the transformer a few milliseconds after the occurrence of an electrical fault. Those systems minimize the chance that a transformer tank will rupture given a minor fault but are not effective on major internal faults.
Alternatives to mineral-based transformer oil
Transformer oil is available in different levels of ignitability, including those approved by FM Global. FM Data Sheet 5-4 indicates different levels of protection depending on the type of fluid used. Alternatives include, but are not limited to, esters and silicone oil.
See also
Arc fault
Cascading failure
Countermeasure
Critical infrastructure protection
Electric grid security
Electrical power distribution
Fire test
Firewall (construction)
North American Electric Reliability Corporation
Passive fire protection
References
Armour
Electric power conversion
Electric transformers
Energy infrastructure
Explosions
Infrastructure
Passive fire protection
Security engineering
|
367168
|
https://en.wikipedia.org/wiki/Pound%20sign
|
Pound sign
|
The pound sign is the symbol for the pound sterling – the currency of the United Kingdom and previously of Great Britain and of the Kingdom of England. The same symbol is used for other currencies called pound, such as the Gibraltar, Egyptian, Manx and Syrian pounds. The sign may be drawn with one or two bars (this is a font design choice) but the Bank of England has used the one-bar style exclusively since 1975.
In Canada and the United States, "pound sign" refers to the symbol (number sign).
Origin
The symbol derives from the upper case Latin letter , representing libra pondo, the basic unit of weight in the Roman Empire, which in turn is derived from the Latin word, libra, meaning scales or a balance. The pound became an English unit of weight and in England became defined as the tower pound (equivalent to 350 grams) of sterling silver. According to the Royal Mint Museum:
However, the simple letter L, in lower- or uppercase, was used to represent the pound sterling in printed books and newspapers until well into the 19th century. In the blackletter type used until the seventeenth century, the letter L is rendered as .
Usage
The pound sign is placed before the number (e.g., £12,000) and separated from the following digits by no space or only a thin space.
Other English variants
Canadian English
In Canadian English the symbols and are both called the pound sign, but the # is also known as the 'number sign' and as the 'noughts-and-crosses board'.
US English
In American English, the term "pound sign" usually refers to the symbol (number sign), and the corresponding telephone key is called the "pound key".
Historic variants
Double bar style
Banknotes issued by the Bank of England since 1975 have only used the single bar style as a pound sign. The Bank used both the two-bar style () and the one-bar style () (and sometimes a figure without any symbol whatever) more or less equally since 1725 until 1971, intermittently and sometimes concurrently. In typography, the symbols are allographs style choices when used to represent the pound; consequently fonts use (Unicode) code point irrespective of which style chosen, (not despite its similarity). It is a font design choice on how to draw the symbol at U+00A4: although most computer fonts do so with one bar, the two-bar style is not rare (as may be seen in the illustration above).
Other
In the eighteenth-century Caslon metal fonts, the pound sign was identical to an italic uppercase J, rotated 180 degrees.
Currencies that use the pound sign
Egypt: Egyptian pound
Falkland Islands: Falkland Islands pound
Gibraltar: Gibraltar pound
Guernsey: Guernsey pound
Isle of Man: Manx pound
Jersey: Jersey pound
St Helena: Saint Helena pound
South Sudan: South Sudanese pound
Sudan: Sudanese pound
Syria: Syrian pound
United Kingdom: Pound sterling
Former currencies
Australia: Australian pound
Canada: Canadian pound
Cyprus: Cypriot pound
Ireland: Irish pound
New Zealand: New Zealand pound
Code points
In the Unicode standard, the symbol £ is called , and the symbol ₤ is the . These have respective code points:
Unicode notes that the "lira sign" is not widely used and was added due to both it and the pound sign being available on HP printers.
The encoding of the £ symbol in position xA3 (15610) was first standardised by ISO Latin-1 (an "extended ASCII") in 1985. Position xA3 was used by the Digital Equipment Corporation VT220 terminal, Mac OS Roman, the Amstrad CPC, the Commodore Amiga and the Acorn Archimedes.
Many early computers (limited to a 7-bit, 128-position character set) used a variant of ASCII with one of the less-frequently used characters replaced by the £. The UK national variant of ISO 646 was standardised as BS 4730 in 1985. This code was identical to ASCII except for two characters: x23 encoded instead of , while x7E encoded instead of . MSDOS on the IBM PC originally used a non-standard 8-bit character set Code page 437 in which the £ symbol was encoded as x9C; adoption of ISO character codes only came later with Microsoft Windows. The Atari ST also used position x9C. The HP LaserJet used position xBA for the £ symbol, while most other printers used x9C. The BBC Ceefax system which dated from 1976 encoded the £ as x23. The ZX Spectrum and the BBC Micro used x60 (grave). The Commodore 64 used x5C while the Oric used x5F . IBM's EBCDIC code page 037 uses xB1 for the £ while its code page 285 uses x5B. ICL's 1900-series mainframes used a six-bit (64-position character set) encoding for characters, loosely based on BS 4730, with the £ symbol represented as octal 23 (hex 13, dec 19).
Entry methods
Typewriters
Typewriters produced for the British market included a "£" sign from the earliest days, though its position varied widely. A 1921 advertisement for an Imperial Typewriters model D, for example shows a machine with two modifier shifts (CAPS and FIG), with the "£" sign occupying the FIG shift position on the key for letter "B". But the advertisement notes that "We make special keyboards containing symbols, fractions, signs, etc., for the peculiar needs of Engineers, Builders, Architects, Chemists, Scientists, etc., or any staple trade."
On Latin-alphabet typewriters lacking a "£" symbol type element, a reasonable approximation could be made by overtyping an "f" over an "L".
Compose key
The compose key sequence is:
Windows, Linux, Unix
On Microsoft Windows, Linux and Unix, the UK keyboard layout has the "£" symbol on the 3 number key and is typed using:
On a US-International keyboard in Windows, the "£" can be entered using:
(on older keyboards without an AltGr key)
On a US-International keyboard in Linux and Unix, the "£" can be entered using:
followed by
In Windows, it can also be generated through the Alt keycodes, although the results vary depending on factors such as the locale, codepage and OS version:
+ (keeping Alt pressed until all 4 digits have been typed on the numeric keypad only)
+ (this also works in MS-DOS)
The Character Map utility and Microsoft Word's Insert Symbol commands may also be used to enter this character.
Mac OS
The symbol "£" is in the MacRoman character set and can be generated on most non-UK Mac OS keyboard layouts which do not have a dedicated key for it, typically through:
On UK Apple Mac keyboards, this is reversed, with the "£" symbol on the number 3 key, typed using:
(and the number sign "#" generated by )
Android
Pressing and holding the local currency sign will invoke a pop-up box presenting an array of currency signs, from which the pound sign may be chosen.
Other uses
The logo of the UK Independence Party, a British political party, is based on the pound sign, symbolising the party's opposition to adoption of the euro and to the European Union generally.
A symbol that appears to be a double-barred pound sign is used as the logo of the record label Parlophone. In fact this is a stylised version of a blackletter L (), standing for Lindström (the firm's founder Carl Lindström).
The pound sign was used as an uppercase letter (the lowercase being ſ) signifying in the early 1993–1995 version of the Turkmen Latin alphabet.
See also
Latin letter L with stroke
Semuncia
:Category:Currency symbols
Notes
References
Currency symbols
|
63087857
|
https://en.wikipedia.org/wiki/Robert%20France
|
Robert France
|
Robert Bertrand France (October 8, 1960 – February 15, 2015) was a Jamaica-born American computer scientist.
Robert B. France was born in Jamaica on October 8, 1960, the eldest son of Robert W. and Jeanette France. He attended high school in Guyana and studied for a BSc degree in Natural Sciences at the University of the West Indies in Saint Augustine, Trinidad and Tobago, majoring in Computer Science and Mathematics and receiving a first class degree in 1984. He then attended Massey University in New Zealand funded by a Commonwealth Scholarship, where he achieved a PhD degree in computer science in 1990. During the same year, he married Sheriffa R. Soleyn in Saint Vincent. They emigrated to the United States together and in due course moved to Fort Collins, Colorado.
During 1990–92, France was a postdoctoral research associate at the Institute for Advanced Computer Studies, University of Maryland. From 1992 to 1997, he was an assistant professor in the computer science and engineering department at Florida Atlantic University (FAU), becoming tenured in 1997–98. France was then appointed an associate professor from 1998 until 2004 and then full professor at Colorado State University within the department of computer science. He undertook research on model-driven software development, especially concerning formal software modeling languages and associated analysis tools. He was co-founder and editor-in-chief of the Software and Systems Modeling journal from 1999 until 2015.
In 2008, Robert France and his co-authors Andy Evans, Kevin Lano, and Bernhard Rumpe, were awarded the Ten Year Most Influential Paper Award at the MODELS 2008 Conference on Model Driven Engineering Languages and Systems for the 1998 paper "The UML as a Formal Modeling Notation". In 2013, France was awarded a five-year International Chair at INRIA in France. He was awarded a senior Dahl–Nygaard Prize for his research by the Association Internationale pour les Technologies Objets (AITO) in 2014. In the same year, he was awarded a Colorado State University, College of Natural Sciences Professor Laureate and an Excellence in Science and Technology Award from the Institute of Caribbean Studies.
Robert France died on February 15, 2015. He had a son and daughter with his wife, Sheriffa.
Selected publications
References
External links
Robert France home page
Robert France on ResearchGate
Dr. Robert France, Professor, Computer Science, Colorado State University on Vimeo
Robert B. France on DBLP
1960 births
2015 deaths
Jamaican men
University of the West Indies alumni
Massey University alumni
Jamaican expatriates in the United States
American computer scientists
Formal methods people
Software engineering researchers
Academic journal editors
Florida Atlantic University faculty
Colorado State University faculty
|
41318226
|
https://en.wikipedia.org/wiki/LaTeXML
|
LaTeXML
|
LaTeXML is a free, public domain software, which converts LaTeX documents to XML, HTML, EPUB, JATS and TEI.
Workflow
LaTeXML's primary output format is an XML representation of (La)TeX's document model. A postprocessor can convert these XML documents into other structured formats. Common uses cases create HTML with mathematical formulas as images or XHTML, HTML5, and EPUB with formulas as MathML. Compared to other LaTeX-to-XML processors, LaTeXML aims to conserve the semantic structures of the LaTeX markup. This makes it a good basis for semantic services like Math search.
Conversion times range from 30 milliseconds for a single formula (in the LaTeXML daemon) to minutes for book-size documents.
History
LaTeXML was started in the context of the Digital Library of Mathematical Functions at NIST, where LaTeX documents needed to be prepared for publication on the Web. The system has been under active development for over a decade, and has attracted a small, but dedicated community of developers and users centered on Bruce Miller, the original project author.
The current released version is LaTeXML 0.8.6. It was released in September 2021, and development remains active on the public repository.
Notable usage
LaTeXML was used to convert 90% (60% without errors) of 530,000 documents from the arXiv to XML. As a result of this ongoing effort for enhancing coverage, LaTeXML supports a large range of LaTeX packages. The ACL 2014 conference used LaTeXML to convert submitted papers to XML. This followed existing work which has been trying to convert the ACL Anthology papers to high-quality semantic markup for further analysis. Since February, 2013, LaTeXML has been used as to render the web pages on the peer produced mathematics website, PlanetMath. Since July, 2015, it was adopted by Authorea for their advanced LaTeX support. In 2018, the second data release of the European Space Agency's Gaia project was realized via LaTeXML.
In February of 2022, arXiv announced an experimental service based on LaTeXML, offering 1.78 million documents as HTML5. A LaTeXML developer claimed successful conversion of 74% of arXiv, with 97% of articles "at least partially viewable".
Implementation
The core of LaTeXML is a Perl reimplementation of TeX's parsing and digestion algorithm coupled with a customizable XML emitter. To conserve the semantic structures in the LaTeX markup, LaTeXML needs XML bindings for all LaTeX packages with high-level macro definitions. The LaTeXML distribution currently provides XML bindings for over 200 commonly used LaTeX packages such as AMSTeX, Babel and PGF/TikZ (which only has experimental support).
The LaTeXML conversion consists of two stages:
the first one parses LaTeX and converts that into a LaTeX-near XML document type, and
the second (post-processing) transforms the XML into one of the standardized structured output formats.
LaTeXML 0.8 added daemon functionality which enabled multiple conversions and easy embedding into web services.
References
External links
http://dlmf.nist.gov/LaTeXML/
LaTeXML source code
LaTeXML web server, services, and demos
Free TeX software
Free mathematics software
Public-domain software
MathML
TeX software for Windows
TeX software for macOS
|
769705
|
https://en.wikipedia.org/wiki/Graphical%20widget
|
Graphical widget
|
A graphical widget (also graphical control element or control) in a graphical user interface is an element of interaction, such as a button or a scroll bar. Controls are software components that a computer user interacts with through direct manipulation to read or edit information about an application. User interface libraries such as Windows Presentation Foundation, GTK, and Cocoa, contain a collection of controls and the logic to render these.
Each widget facilitates a specific type of user-computer interaction, and appears as a visible part of the application's GUI as defined by the theme and rendered by the rendering engine. The theme makes all widgets adhere to a unified aesthetic design and creates a sense of overall cohesion. Some widgets support interaction with the user, for example labels, buttons, and check boxes. Others act as containers that group the widgets added to them, for example windows, panels, and tabs.
Structuring a user interface with widget toolkits allows developers to reuse code for similar tasks, and provides users with a common language for interaction, maintaining consistency throughout the whole information system.
Graphical user interface builders facilitate the authoring of GUIs in a WYSIWYG manner employing a user interface markup language. They automatically generate all the source code for a widget from general descriptions provided by the developer, usually through direct manipulation.
History and use
Any widget displays an information arrangement changeable by the user, such as a window or a text box. The defining characteristic of a widget is to provide a single interaction point for the direct manipulation of a given kind of data. In other words, widgets are basic visual building blocks which, combined in an application, hold all the data processed by the application and the available interactions on this data.
GUI widgets are graphical elements used to build the human-machine-interface of a program. GUI widgets are implemented like software components. Widget toolkits and software frameworks, like e.g. GTK+ or Qt, contain them in software libraries so that programmers can use them to build GUIs for their programs.
A family of common reusable widgets has evolved for holding general information based on the Palo Alto Research Center Inc. research for the Xerox Alto User Interface. Various implementations of these generic widgets are often packaged together in widget toolkits, which programmers use to build graphical user interfaces (GUIs). Most operating systems include a set of ready-to-tailor widgets that a programmer can incorporate in an application, specifying how it is to behave. Each type of widget generally is defined as a class by object-oriented programming (OOP). Therefore, many widgets are derived from class inheritance.
In the context of an application, a widget may be enabled or disabled at a given point in time. An enabled widget has the capacity to respond to events, such as keystrokes or mouse actions. A widget that cannot respond to such events is considered disabled. The appearance of a widget typically differs depending on whether it is enabled or disabled; when disabled, a widget may be drawn in a lighter color (grayed out) or be obscured visually in some way. See the adjacent image for an example.
The benefit of disabling unavailable controls rather than hiding them entirely is that users are shown that the control exists but is currently unavailable (with the implication that changing some other control may make it available), instead of possibly leaving the user uncertain about where to find the control at all.
Widgets are sometimes qualified as virtual to distinguish them from their physical counterparts, e.g. virtual buttons that can be clicked with a pointer, vs. physical buttons that can be pressed with a finger.
A related (but different) concept is the desktop widget, a small specialized GUI application that provides some visual information and/or easy access to frequently used functions such as clocks, calendars, news aggregators, calculators and desktop notes. These kinds of widgets are hosted by a widget engine.
Etymology
“Widget” entered American English around 1920, as a generic term for any useful device, particularly a product manufactured for sale. In computer use it has been borrowed as a shortened form of “window gadget,” and was first applied to user interface elements during Project Athena in 1988. The word was chosen because "all other common terms were overloaded with inappropriate connotations" – since the project's Intrinsics toolkit associated each widget with a window of the underlying X Window System – and because of the common prefix with the word window.
List of common generic widgets
Selection and display of collections
Button – control which can be clicked upon to perform an action. An equivalent to a push-button as found on mechanical or electronic instruments.
Radio button – control which can be clicked upon to select one option from a selection of options, similar to selecting a radio station from a group of buttons dedicated to radio tuning. Radio buttons always appear in pairs or larger groups, and only one option in the group can be selected at a time; selecting a new item from the group's buttons also de-selects the previously selected button.
Check box – control which can be clicked upon to enable or disable an option. Also called a tick box. The box indicates an "on" or "off" state via a check mark/tick ☑ or a cross ☒. Can be shown in an intermediate state (shaded or with a dash) to indicate that various objects in a multiple selection have different values for the property represented by the check box. Multiple check boxes in a group may be selected, in contrast with radio buttons.
Toggle switch - Functionally similar to a check box. Can be toggled on and off, but unlike check boxes, this typically has an immediate effect.
Toggle Button - Functionally similar to a check box, works as a switch, though appears as a button. Can be toggled on and off.
Split button – control combining a button (typically invoking some default action) and a drop-down list with related, secondary actions
Cycle button - a button that cycles its content through two or more values, thus enabling selection of one from a group of items.
Slider – control with a handle that can be moved up and down (vertical slider) or right and left (horizontal slider) on a bar to select a value (or a range if two handles are present). The bar allows users to make adjustments to a value or process throughout a range of allowed values.
List box – a graphical control element that allows the user to select one or more items from a list contained within a static, multiple line text box.
Spinner – value input control which has small up and down buttons to step through a range of values
Drop-down list – A list of items from which to select. The list normally only displays items when a special button or indicator is clicked.
Menu – control with multiple actions which can be clicked upon to choose a selection to activate
Context menu – a type of menu whose contents depend on the context or state in effect when the menu is invoked
Pie menu – a circular context menu where selection depends on direction
Menu bar – a graphical control element which contains drop down menus
Toolbar – a graphical control element on which on-screen buttons, icons, menus, or other input or output elements are placed
Ribbon – a hybrid of menu and toolbar, displaying a large collection of commands in a visual layout through a tabbed interface.
Combo box (text box with attached menu or List box) – A combination of a single-line text box and a drop-down list or list box, allowing the user to either type a value directly into the control or choose from the list of existing options.
Icon – a quickly comprehensible symbol of a software tool, function, or a data file.
Tree view – a graphical control element that presents a hierarchical view of information
Grid view or datagrid – a spreadsheet-like tabular view of data that allows numbers or text to be entered in rows and columns.
Navigation
Link – Text with some kind of indicator (usually underlining and/or color) that indicates that clicking it will take one to another screen or page.
Tab – a graphical control element that allows multiple documents or panels to be contained within a single window
Scrollbar – a graphical control element by which continuous text, pictures, or any other content can be scrolled in a predetermined direction (up, down, left, or right)
Text/value input
Text box – (edit field) - a graphical control element intended to enable the user to input text
Combo box – a graphical control element combining a drop-down list or list box and a single-line editable textbox
Output
Label – text used to describe another widget
Tooltip – informational window which appears when the mouse hovers over another control
Balloon help
Status bar – a graphical control element which poses an information area typically found at the window's bottom
Progress bar – a graphical control element used to visualize the progression of an extended computer operation, such as a download, file transfer, or installation
Infobar – a graphical control element used by many programs to display non-critical information to a user
Container
Window – a graphical control element consisting of a visual area containing some of the graphical user interface elements of the program it belongs to
Collapsible panel – a panel that can compactly store content which is hidden or revealed by clicking the tab of the widget.
Drawer: Side sheets or surfaces containing supplementary content that may be anchored to, pulled out from, or pushed away beyond the left or right edge of the screen.
Accordion – a vertically stacked list of items, such as labels or thumbnails where each item can be "expanded" to reveal the associated content
Modal window – a graphical control element subordinate to an application's main window which creates a mode where the main window can't be used.
Dialog box – a small window that communicates information to the user and prompts for a response
Palette window – also known as "Utility window" - a graphical control element which floats on top of all regular windows and offers ready access tools, commands or information for the current application
Inspector window – a type of dialog window that shows a list of the current attributes of a selected object and allows these parameters to be changed on the fly
Frame – a type of box within which a collection of graphical control elements can be grouped as a way to show relationships visually
Canvas – generic drawing element for representing graphical information
Cover Flow – an animated, three-dimensional element to visually flipping through snapshots of documents, website bookmarks, album artwork, or photographs.
Bubble Flow – an animated, two-dimensional element that allows users to browse and interact the entire tree view of a discussion thread.
Carousel (computing) – a graphical widget used to display visual cards in a way that’s quick for users to browse, both on websites and on mobile apps
See also
Graphical user interface elements
Geometric primitive
Widget engine for mostly unrelated, physically inspired "widgets"
Widget toolkit – a software library which contains a collection of widgets
Interaction technique
References
External links
Packaged Web Apps (Widgets) - Packaging and XML Configuration (Second Edition) - W3C Recommendation 27 November 2012
Widgets 1.0: The Widget Landscape (Q1 2008). W3C Working Draft 14 April 2008
Requirement For Standardizing Widgets. W3C Working Group Note 27 September 2011
Graphical user interface elements
Graphical user interfaces
|
11650297
|
https://en.wikipedia.org/wiki/Muertos%20Vivos
|
Muertos Vivos
|
Muertos Vivos is Gob's fifth studio album. It was released October 23, 2007 in Canada, November 27, 2007 in the United States and December 5, 2007 in Japan. It is the only album featuring bassist Tyson Maiko, who left the band in 2008.
The album's title is Spanish for "living dead". The first single from the album was "We're All Dying", which got its first radio play on June 18, 2007. The second single, "Underground", was first played on The Fox Vancouver, 99.3. The third single was "Banshee Song", released in 2009.
A song frontman Tom Thacker has originally written for this album, entitled "Panic Attack", has become the title track from Sum 41's fifth studio album Screaming Bloody Murder, which was the band's first album to be recorded with Thacker as lead guitarist.
The album cover art is a reprint of Calavera Oaxaqueña by Mexican folk artist José Guadalupe Posada
Track listing
All songs written by Thomas Thacker, except where noted otherwise.
Singles
"We're All Dying"
"Underground"
"Banshee Song"
Credits
Gob
Tom Thacker - lead vocals, lead & rhythm guitars, production, sound engineering, mixing
Theo Goutzinakis - lead & rhythm guitars, lead vocals on "Face the Ashes", backing vocals, production, sound engineering, mixing
Gabe Mantle - drums, percussion
Tyson Maiko - bass
Ted Jensen - mastering
Dave Ogilvie - mixing
Misha Rajaratnam - editing
Paul Silveira - vocals, sound engineering, mixing
Rob Stefanson - vocals, sound engineering
References
2007 albums
Gob (band) albums
Aquarius Records (Canada) albums
|
32362385
|
https://en.wikipedia.org/wiki/Criticism%20of%20Confucius%20Institutes
|
Criticism of Confucius Institutes
|
The Confucius Institute (CI) program, which began establishing centers for Chinese language instruction in 2004, has been the subject of criticisms, concerns, and controversies during its international expansion.
Many such concerns stem from the CI's relationship to Chinese Communist Party (CCP) authorities, giving rise to criticisms about undermining academic freedom at host universities, engaging in industrial and military espionage, surveillance of Chinese students abroad, and attempts to advance the Chinese government's political agendas on controversial issues such as Taiwan, and human rights in China and Tibet. Additional concerns have arisen over the institutes' financial and academic viability, teaching quality, and relations with Chinese partner universities.
Confucius Institutes have defended their establishments, comparing them with other cultural promotion organizations such as Alliance française and Goethe-Institut. However, unlike the Alliance française or Goethe-Institut, many Confucius Institutes operate directly on university campuses, thus giving rise to unique concerns related to academic freedom and political influence, however, after a year long investigation into the Confucius Institutes in the United States, the Government Accountability Office (GAO) released a report in February 2019 that was unable to find any evidence of any widespread attempts to restrict academic freedom with people directly involved in the programs stating there had been no attempts to interfere with their curriculum, although the concern still remains. Some observers have noted that CIs are largely limited to teaching cultural and language programs, and the institutes' staff tend to see political and controversial subjects as human rights and democracy as outside the context of the mission of a Confucius Institute.
Background
The Confucius Institute program began in 2004 and is financed by the quasi-governmental Office of Chinese Language Council International (colloquially, Hanban), which is chaired by Politburo member and Vice Premier Liu Yandong, former head of the United Front Work Department. Hanban is governed by "a council of high state and party officials" drawn from a variety of party and state ministries including Foreign Affairs, Education, and the State Council Information Office (also known as the "Office of Foreign Propaganda") . Marshall Sahlins of the University of Chicago describes Hanban as "an instrument of the party state operating as an international pedagogical organization." The institutes operate in co-operation with local affiliate colleges and universities around the world. The related Confucius Classroom program partners with secondary schools and school districts to provide Chinese language teachers and instructional materials.
The Confucius Institute has grown rapidly from one campus in Seoul in 2004 to more than 400 worldwide in 2013, and opposition to the program "has grown almost as dramatically." Critics have accused CIs of having restrictive hiring practices and not conforming to western political ideals on issues such as the legitimacy of the Taiwanese state and origins of the Korean War.
In evidence of the "spectacular proliferation" of CIs, Lionel Jensen notes they have become so familiar in the United States a segment of The Daily Show made a parody out of a community group's opposition to the CI teaching Mandarin in a public school.
Objectives
Confucius Institutes' stated missions are to promote knowledge of Chinese language and culture abroad, as well as to promote commercial and trade cooperation. In the context of the Chinese Communist Party's foreign policy objectives, the institutes serve as tools of cultural diplomacy intended to bolster China's soft power abroad.
Official Communist Party literature describes the Institutes in the context of Hu Jintao's soft power initiatives, designed to influence perceptions of China and its policies abroad. Li Changchun, the 5th-highest-ranking member of the Politburo Standing Committee, was quoted in The Economist saying the Institutes were "an important part of China's overseas propaganda set-up".
The Economist notes China "has been careful not to encourage these language centres to act as overt purveyors of the party's political viewpoints, and little suggests they are doing so", but also noted the important goal of giving the world a "more accurate" understanding of China, as well as efforts in opposing Chinese dissident groups abroad, such as anti-communist party groups, separatist activities, and the Falun Gong in California.
Lionel M. Jensen, associate professor of East Asian languages and cultures from the University of Notre Dame, while noting "so far there have not been any events in which the academic freedom of the host university was explicitly threatened by authorities of Hanban", expressed concerns regarding the CI's educational diversity and quality of teaching. Jensen said the Hanban has reduced the diversity of China's cultures to a "uniform, quaint commodity", characterized by Chinese opera and dance performances, which he calls "culturetainment", meaning "the abridgment of Chinese civilization in the name of digestible forms of cultural appeal can be readily shipped overseas."
Randolph Kluver, Director of the Confucius Institute at Texas A&M University, said that the soft power paradigm was inadequate for understanding CIs, which could better be understood within a "communicative paradigm" of bringing China's cultural resources into a global conversation about values, politics, and culture. Kluver concluded that despite the Western suspicions of a Communist Party agenda, Confucius Institutes had little impact on attitudes towards the Chinese government.
The New York Times foreign correspondent Jane Perlez reported that the 2013 Pew Global Attitudes Project survey revealed China's approval rating in the United States had dropped 14 percentage points in two years, to the lowest rating for China in any region of the world. Perlez cited an article in the Journal of Contemporary China by Tao Xie, a professor of political science at Beijing Foreign Studies University, who said in an interview that his analysis "was rejected by Chinese academic publications because it criticized the Confucius Institutes that the Chinese government has opened in many countries." Professor Tao statistically analyzed data from the 2007 Pew Global Attitudes survey for factors that affect cross-national variations in China's national image. Presuming that Chinese foreign direct investment would increase positive public perceptions of China among recipients, Tao tested and disproved a hypothesis that "the number of Confucius institutes in a country should be positively related to favorable opinions about China among that country's people." Tao notes that the number of institutes many be endogenous in statistical terms, because the Hanban has opened most CIs in Europe and North America, "where perceptions of China have been the most unfavorable". Professor Tao concludes that the data reveal, "the Confucius institutes and classrooms have not succeeded in reversing the rather negative image of China in most of the countries where they are located." This conclusion was criticized by other Chinese scholars as "limited," who reject this causational relationship, claiming instead that favorability of China is not solely determined by Confucius Institutes.
Addressing a 2014 Dublin conference for European CIs, Liu Yunshan, Director of the Propaganda Department of the Chinese Communist Party, said Confucius Institutes had emerged at the right moment, and described them as a "spiritual high-speed rail" [心灵高铁], promoting friendship by connecting "Chinese dreams" with those of the rest of the world.
Perceived influences
A number of criticisms surrounding the Confucius Institutes stem from their relationships with the Chinese government, through the Office of Chinese Language Council International or "Hanban". The Hanban website states that Confucius Institutes and Classrooms are non-profit educational institutions, but they have close ties to several senior CCP officials, including the current Hanban chair and Politburo member Liu Yandong, who was formerly head of the United Front Work Department. The Hanban members encompass twelve Chinese government institutions, from the Ministry of Education to the State Council Information Office (or "Office of Foreign Propaganda") and the National Development and Reform Commission, "through organizations dealing with Finance, Overseas Chinese, Foreign Affairs, Foreign Trade, Culture and all the media organizations." "United Front Work" is a concept that harks back to the Chinese civil war and refers to "Beijing's efforts to identify friends and isolate enemies. The logic here is that true friends will identify and isolate enemies from the CCP, while hiding any hint of direct involvement by the Party itself." Steven W. Mosher, president of the Population Research Institute, testified the United Front Work Department's purpose "is subversion, cooption and control," and claimed one of the CI's chief purposes is "to subvert, coopt, and ultimately control Western academic discourse on matters pertaining to China."
An article from the state-run China Daily said that "Confucius Institutes' work is misunderstood from time to time," citing the example of Mosher calling CIs "Trojan Horses with Chinese characteristics." In response, Xu Lin, director-general of the Hanban, said, "The Confucius Institutes are definitely not Trojan Horses, since we are holding no weapons in our hands." An Asian Survey article notes concerns over a "Trojan horse effect" of CIs. "The Confucius Institute project can be seen at one level as an attempt to increase Chinese language learning and an appreciation of Chinese culture, but at another level it is part of a broader soft power projection in which China is attempting to win hearts and minds for political purposes." Besides CIs, some other ways China raises its cultural profile overseas include Chinese contemporary art exhibitions, television programs, concerts by popular singers, and translations of Chinese literature.
According to Fabrice De Pierrebourg and Michel Juneau-Katsuya, a number of individuals holding positions within the Confucius Institute system have backgrounds in Chinese security agencies and United Front Work Department, "which manages important dossiers concerning foreign countries. These include propaganda, the control of Chinese students abroad, the recruiting of agents among the Chinese diaspora (and among sympathetic foreigners), and long-term clandestine operations."
A declassified intelligence report by the Canadian Security Intelligence Service (CSIS) says, "Beijing is out to win the world's hearts and minds, not just its economic markets, as a means of cementing power." In an interview on CBC Television, Richard Fadden, director of the CSIS, said that while China was funding Confucius Institutes in most of the campuses across Canada, they were "managed by people operating out of the embassy or consulates" who had organized "demonstrations to deal with what are called the five poisons: Taiwan, Falun Gong and others". Stockholm's Institute for Security and Development Policy described the founding of CIs as "an image management project, the purpose of which is to promote the greatness of Chinese culture while at the same time counterattacking public opinion which maintains the presence of a 'China threat' in the international community."
Although the number of Indian students taking Chinese language courses is on the increase, the Ministry of External Affairs rejected the idea of establishing Confucius Institutes in schools, as they were "using culture to spread propaganda and influence." Of the more than 17 CIs launched in Japan since 2005, all were at private colleges, instead of at more prestigious national universities. "Chinese culture traditionally holds significant influence in Japan, but people remain concerned by the potential ideological and cultural threat of Chinese government-run projects such as CIs."
A Der Spiegel article about threats from China's soft power criticized Beijing for using Confucius Institutes "in hopes of promoting what it views as China's cultural superiority". German sinologists disagree about the degree of government control over the system. Jörg-Meinhard Rudolph from the East Asia Institute (Ludwigshafen) noted no German political party had financed any educational institutions in German universities, "yet they are accepting money from the undemocratic Chinese Communist Party." Michael Lackner, deputy head of the Confucius Institute at the University of Erlangen-Nuremberg, described the influence of German universities and said, "I am not sure whether Confucius Institute Headquarters really know what Chinese culture is. Thus, German academics could help define Chinese culture as a world culture."
At a hearing of the United States-China Economic and Security Review Commission, Anne-Marie Brady, a University of Canterbury political science professor, testified that China considers propaganda work the "life blood of the Party-State in the current era", and promotes foreign propaganda towards the Overseas Chinese community through Confucius Institutes and activities such as "root-seeking" cultural tours. Three years later, Professor Brady analogized, "If we had a U.S. government agency that was stating that it was a tool for U.S. government propaganda, my colleagues would be up in arms about having a center like that on campus."
There has also been criticism over the Communist Party's appropriation of Confucius. Under Mao Zedong, Confucian values and teachings were perennial targets of criticism and suppression, being viewed as vestiges of feudalism. According to Asia Times Online, the Chinese Communist Party under Mao Zedong criticized Confucian teachings as "rubbish that should be thrown into the 'Ash heap of history'" while the 21st-century CCP uses Confucianism as "an assistant to the Chinese god of wealth (and a representative of Chinese diplomacy), but not a tutor for Chinese soul."
Comparisons with similar organizations
Confucius Institutes are frequently compared to cultural associations such as the UK's British Council, Germany's Goethe-Institut, France's Alliance Française, Italy's Società Dante Alighieri, and Spain's Instituto Cervantes. For instance, an editorial in the state-owned China Daily newspaper accused CI opponents of double standards for not calling "Goethe-Institut, Alliance Française or Cervantes Institutes propaganda vehicles or tools of cultural invasion". The editorial noted that "China is not the first to set up such institutes nor does it have a monopoly over overseas cultural promotion."
However, unlike the aforementioned organizations, the CI model is attachment to universities or other educational institutions, thus leading to suspicions the institutes are "aimed less at fostering interest in China and Chinese culture itself, and more at ensuring that such interest is guided along lines approved of by the Chinese party-state." Steven Mosher notes: "Unlike Alliance Francaise, the Confucius Institutes are not independent from their government; unlike the Goethe-Institut establishments, they do not occupy their own premises. Instead, participating universities agree to provide office space in exchange for funding, and to cede academic control to the United Front Work Department of the Chinese Communist Party." Martin Davidson, chief executive of the British Council, criticized comparisons between his institution and CIs. "We are a stand-alone organization operating out of our own premises. They are being embedded in university campuses. The real question has to be one of independence." Davidson said while the Chinese are very clear about wanting to combat negative propaganda with positive propaganda, "The danger is more of self-censorship – which is a very subtle thing."
Jocelyn Chey, a former diplomat and expert in Australia-China relations, stated the Confucius Institutes are more closely managed by its government compared with its French counterpart. She believes the institute's program is most valuable where it supports culture and outreach into the community. Chey however states CI is "a propaganda vehicle for the Chinese communist party, and not a counterpart to the Goethe Institute or Alliance Française", and speculates the close links between the institutes and the Chinese Communist Party "could lead at best to a 'dumbing down' of research and at worst could produce propaganda." On the other hand, The Sydney Morning Herald cites a Queensland University of Technology student that "It would be best to understand [Confucius institutes] not as 'propaganda tools' but as 'one instrument of China's cultural diplomacy to wield and bolster Chinese soft power globally'".
Confucius Institutes also bear similarities to the Chinese Students and Scholars Association which has come under criticism for interference by the Chinese government on American university campuses.
Financing
Confucius Institutes mostly run a small number of classes, with an average budget of US$400,000 per institute in 2009. They are funded jointly by grants from China's Ministry of Education and funds from host universities; although Hanban set a financial objective for self-sufficiency within five years, many CIs have struggled. David Shambaugh says Confucius Institute funding "is in fact laundered through the MOE from the CCPPD's [i.e., CCP Propaganda Department's] External Propaganda Department".
David Prager Branner, a Chinese professor at Columbia University, warns that taking money from China to set up Confucius Institutes could have long-term consequences and questions whether it would be in America's national interest. Some critics have suggested Beijing's contributions to host universities gives Chinese authorities too much leverage over those institutions. The sizeable grants coming with the establishment of Confucius Institutes could make universities more susceptible to pressures from Beijing to exercise self-censorship, particularly on Chinese human rights issues or other politically sensitive topics. The Economist points out that some Chinese language courses at Confucius Institutes are even paid for by the Pentagon under the National Security Language Initiative.
In January 2010, the Ministry of Finance of the People's Republic of China announced that the winning bid (CEIECZB01-09JX033) to build and maintain the Confucius Institute Online website was awarded to the Hanban subsidiary company Wuzhou Hanfeng Web Technology Ltd. (Wuzhou Hanfeng Wangluo Keji 五洲汉风网络科技) for 35.2 million yuan (US$5.7 million), which was called "the most expensive website in history" ("史上最贵网站"). Chinese and foreign media outlets reported that Wuzhou Hanfeng Web Technology Ltd. was registered to Wang Yongli 王永利, Deputy Director-General of Hanban and Deputy Chief Executive of Confucius Institute Headquarters, and criticized the Hanban's lack of transparency and corruption. In response, Hanban Director-General Xia Jianhui 夏建辉 said "the website will eventually be made into a learning portal that will be promoted globally, this is a comprehensive project", and maintained that the Hanban did not break any rules by allowing their own subsidiary company to win the contract.
Maria Wey-Shen Siow, East Asia bureau chief of Channel NewsAsia, wrote in the East-West Center's Asia Pacific Bulletin the concerns over Confucius Institutes projecting political undertones "are not completely unfounded, but may not be totally warranted." She highlights, for all the CI controversies, "Han Ban's annual budget was only US$145 million in 2009 so it would be false to state China has been spending massively on these institutes." Lionel Jensen writes, "According to a 2006 BBC report, the Chinese government initially committed $10 billion for operating the Confucius Institute program."
In a 2010 Senate Foreign Relations Committee hearing, Senator Richard Lugar asked Secretary of State Hillary Clinton why China had established 60 Confucius Institutes in the United States but only permitted 4 comparable US cultural centers in China, and she replied, "The Chinese government provides each center with a million dollars to launch, plus they cover operating expenses that exceed $200,000 per year. We don't have that kind of money in the budget."
Some critics, including within China, have expressed worry "the government's support for the CIs' budgets detracts from domestic spending" when the Ministry of Education "budget for domestic compulsory education remains inadequate." Swedish parliamentarian Göran Lindblad asked why Chinese authorities are subsidizing Western educational institutions when "China has ten million children without proper schools."
Financing for the Confucius Institute at the London School of Economics came under criticism following the "LSE Gaddafi links" controversy over accepting a £1.5 million donation from Libya. Christopher Hughes, professor of international relations, said the school's acceptance of about £400,000 from China showed it had failed to learn from the scandal. Hughes accused the CI of being a "divisive" and "illegitimate" propaganda organization, and said its existence would damage the school's reputation. In reference to Hughes, Liu Xiaoming, Chinese ambassador to the United Kingdom, accused CI critics of clinging to "outdated 'cold war' mentality"; to which Hughes replied that it was "gross interference" for Liu to complain about an internal LSE discussion on ethics.
On 10 June, Hughes emailed colleagues discussing CI teaching materials a link to an animated video, in Chinese with English subtitles, on the official Confucius Institute Online website. It was titled "The War to Resist US Aggression and Aid Korea" (which is the Chinese official name Kangmeiyuanchao zhanzheng 抗美援朝战争 for "Korean War) and summarized the Korean War with negative historical revisionism. Specifically, the film "declares that the Chinese were provoked into entering the war because the United States had bombed Chinese villages near the Korean border, and had manipulated the UN Security Council into passing a resolution that enabled American troops to expand aggression against Korea." After the video link began circulating on Twitter, the CI website deleted the webpage on 11 June, but cache copies remain available. This educational animation was part of an online "Chinese history" course under the CI homepage's "Chinese Learning for Kids & Teens" section. The censored video claimed the "United States manipulated the UN Security Council … to enlarge the aggression against Korea" and "tried to seize the whole peninsula"; in response, Chinese "volunteers" from the People's Liberation Army joined the fight and "crushed the imperialists' aggressive ambitions", which "enhanced China's international prestige" in the Korean War.
A 2012 article in The Atlantic questions whether China has squandered the soft-power money spent on CIs and expensive CCTV-4 America studios when wealthy Chinese are seeking exit visas to the US; asking, "What good are Confucius Institutes … when many of your country's elites are voting with their feet and hedging against domestic unpredictability?"
The Economist describes the Hanban's spending on CIs as "considerable, and growing rapidly". In 2013 it was $278m, more than six times as much as in 2006. China's funding for Confucius Institutes amounts to about $100,000-200,000 a year on many campuses, and sometimes more.
According to an article in Foreign Policy, many Chinese view this $278 million expenditure for an overseas soft-power initiative as a waste of money, which would be better spent on building schools in poor rural areas of China.
Espionage
Critics of Confucius Institutes have cited concerns it could serve as a vehicle for industrial and military espionage, as well as for surveillance of Chinese students studying abroad. The intelligence services of several countries have investigated Confucius Institutes, including the Canadian organization CSIS. David Matas said that "informally [the institutes] become a vehicle the Chinese government uses to basically intimidate the academic institutions to run according to their guise and also as a vehicle for infiltration and spying into the campuses to find out what's going on hostile to their interest."
Pierrebourg and Juneau-Katsuya also raised concerns over ties between Confucius Institute administrators and large state-run Chinese companies. For instance, they point to the Confucius Institute at the University of Texas at Dallas, where one of the top officials is also vice-president of Huawei, a Chinese telecom company the U.S. government regards as a national security threat, and which has been accused of industrial espionage, though an extensive security review found no clear evidence of spying.
Toshiyuki Shigesato, then a member of the university affairs board at Japan's Osaka Sangyo University, was made to resign from his post following several unfounded public allegations that Hanban and its Confucius Institutes were front organizations, established specifically for purposes of "gathering cultural intelligence." Shigesato's public claims that Hanban "should [be] recognized as a cultural spy department" were disavowed by other university administrators and faced public outcry from members of the student body. Shigesato was subsequently asked to resign from his post following these public allegations. The acting director of the university, Dobashi Yoshikuni, issued a formal apology on behalf of the university. The apology letter, first published in Japan by Japanese newspaper Kansai Chinese Times, reads: "Osaka Sangyo University hereby apologizes for [Shigesato's] inappropriate and insensitive remarks, which caused many problems. We guarantee that similar incidents will never happen again." The university's official letter of apology was republished in full by Chinese-state newspaper People's Daily .
Political
Confucius Institutes are described as transmitting political influence in a "sublimely veiled manner". Canada's Globe and Mail reported, "Despite their neutral scholarly appearance, the new network of Confucius Institutes does have a political agenda." For example, teaching with the simplified Chinese characters used in the PRC rather than the Traditional Chinese characters used in Taiwan "would help to advance Beijing's goal of marginalizing Taiwan in the battle for global influence." An article in China Heritage Quarterly criticizes teaching only simplified characters in the context of Confucius Institutes as "semi-literacy in Chinese". In response to the PRC's CI program, the Republic of China announced plans in 2011 to establish "Taiwan Academies" in America, Europe, and Asia as part of its cultural diplomacy. The Taiwan Academy program is designed to promote "Taiwanese-favored" Mandarin Chinese, traditional Chinese characters, and Taiwanese topics. Marshall Sahlins also makes this claim about simplified characters, which scholars have disputed; George Washington University historian Edward McCord says many Chinese language departments teach simplified characters of their own volition, and Lewis & Clark College anthropologist Jennifer Hubbert says Sahlins overlooked the fact that most trained sinologists can read Chinese in both character sets, and training in one does not preclude access to the other.
Peng Ming-min, a Taiwan independence activist and politician, writes although on the surface China merely demonstrates its "soft power" through CIs, "Colleges and universities where a Confucius Institute is established all have to sign a contract in which they declare their support for Beijing's "one China" policy. As a result, both Taiwan and Tibet have become taboos at these institutes." Peng lists other examples of CI "untouchable" issues including the 1989 Tiananmen Square massacre, neglect of human rights, environmental pollution in China, and the imprisonment of Liu Xiaobo. However, BC lawyer and China expert Clive Ansley said there were "troubling signs of [China's] growing influence on western campuses" before Confucius Institutes were established. He saw signs the public discussions about certain human-rights issues were being self-censored, out of fear of losing out on intake of Chinese students.
Michael Nylan, professor of Chinese history at the University of California at Berkeley, says CIs have become less heavy-handed in their demands, and have learned from "early missteps," such as insisting universities adopt a policy Taiwan is part of China. Nylan took an informal survey of faculty and administrators at fifteen universities with Confucius Institutes; "two respondents reported that institutes had exerted pressure to block guest speakers," but both events went ahead anyway.
Taiwan is one of the few major countries that do not have Confucius Institutes, and scholars from Academia Sinica's Center for Asia-Pacific Area Studies carried out a two-year research project to collect empirical evidence on CIs. The project leader Michael Hsiao (蕭新煌), chairperson of Academia Sinica's Institute of Sociology, said he learned the implicit rules about off-limit topics—Taiwan, Tibet, the Dalai Lama, the Tiananmen Square massacre, and Falun Gong—during interviews with staff at CI host institutions in Southeast Asian countries and in the US. Hsiao called the Hanban's rapid expansion of Confucius Institutes into over 105 countries "a smart move," but also mentioned that CI criticisms have arisen in at universities worldwide. "People in favor of the institutes say they bring in revenue and provide opportunities for students to learn Chinese. Those opposed to the initiative worry they place limitations on academic freedom and dislike the political machinations behind them."
The historian Yu Ying-shih received the inaugural Tang Prize in Sinology in 2014. At the awards ceremony, he criticized the CCP's promotion of Confucianism and establishment of 465 Confucius Institutes worldwide as "all propaganda with political purposes".
Censorship and academic freedom
Jonathan Zimmerman critically framed the question of Confucius Institutes and academic freedom, "Let's suppose that a cruel, tyrannical, and repressive foreign government offered to pay for American teens to study its national language in our schools. Would you take the deal?" Zimmerman concluded that more Americans should study Chinese, but "on our own terms, making sure that it also reflects our best civic language of freedom, open discussion, and democracy." Chinese history professor Jonathan Lipman from Mount Holyoke College expressed the dilemma of accepting CI funding thus: "By peddling a product we want, namely Chinese language study, the Confucius Institutes bring the Chinese government into the American academy in powerful ways. The general pattern is very clear. They can say, 'We'll give you this money, you'll have a Chinese program, and nobody will talk about Tibet.' In this economy, turning them down has real costs." Professor Terry Russell at the University of Manitoba questioned the Hanban's real motivation, fearing the university would not be able to organize certain activities judged "sensitive" to the Chinese, such as bringing the Dalai Lama onto campus. He said, "'We have a real conflict of our principles of academic freedom,' with the potential to have a faculty version of Chinese history and a Confucius Institute version being taught on campus." According to Cameron Morrill, president of the University of Manitoba Faculty Association, "It is inappropriate to allow any government, either foreign or domestic, control over a university classroom, regardless of how much money they offer." The university later decided against taking Chinese government money to set up CIs.
In 2010, the University of Oregon "came under – and resisted – pressure from the Chinese consul general in San Francisco" to cancel a lecture by Peng Ming-Min (see above). Glenn Anthony May, a UO history professor wrote an article expressing concerns that Confucius Institutes "come with visible strings attached." For instance, host institutions must sign a memorandum of understanding to support the One-China policy. "At universities, we normally have an opportunity to debate issues like that, allowing professors like me and students to take issue publicly with our government's policy. Hanban, for obvious reasons, wants no such discussion to occur." Meiru Liu, director of the Confucius Institute at Portland State University, rejects May's criticisms CIs hinder open discussions of issues such as the treatment of political activist Liu Xiaobo. Meiru Liu explained that while Falun Gong, dissidents and 1989 Tiananmen Square protests are not topics the Confucius Institute headquarters would like to see organized by the institutes, they are "not major interest and concerns now by general public at large here in the US." Fellow UO professor and CI director Bryna Goodman countered May, noting the local Confucius Institute hosted forums on sensitive topics such as China's internet censorship and economic regulations, and "We haven't gotten any topic that has been proposed to us that we have considered out of bounds."
The establishment of some Confucius Institutes has been opposed or blocked by faculty members at universities. Faculty at the University of Pennsylvania decided not to negotiate with CI due to fears of meddling in course curriculum. Members of the Chinese studies department at the University of Melbourne forced the institute off the main campus. Faculty at Stockholm University demanded the separation of the Nordic Confucius Institute from the university, but an independent assessment rejected their claims that the Chinese Embassy in Stockholm was using the CI for conducting political surveillance and inhibiting academic freedom.
In writing for The Christian Science Monitor, Jonathan Zimmerman, a historian at New York University, warned that Confucius Institutes resemble the 1930s "Mussolini model" of financing Italian language schools in America for Fascist propaganda purposes.
A major concern of Confucius Institutes is their response to politically sensitive and controversial material such as human rights and Taiwan. Meiru Liu, director of the Confucius Institute at Portland State University, states the local institute had sponsored lectures on Tibet, China's economic development, currency, and US-China relations. Mary E. Gallagher, director of the Center for Chinese Studies at the University of Michigan, said the institutes has been free in covering "that are controversial and sensitive in China". In particular, the Confucius Institute in Edinburgh promoted a talk by a dissident Chinese author whose works are banned in China.
Lionel M. Jensen, professor of East Asian Languages and history at the University of Notre Dame, said, "Every Confucius Institute is a spectacular experiment in cultural outreach", but "the placement of institutes within the centers, departments, and institutes of public and private universities is without precedent, and threatens the independent pursuit of research that is the enabling premise of higher education."
In June 2014, the American Association of University Professors (AAUP) called on American universities, almost a hundred of which have Confucius Institutes, to reexamine the price they are paying in academic freedom. The AAUP's Report on academic freedom stated, "Confucius Institutes function as an arm of the Chinese state and are allowed to ignore academic freedom."
A 21 June 2014 editorial in The Washington Post listed recent concerns about Confucius Institutes, including the AAUP advising universities to cut ties with CIs unless Hanban agreements are renegotiated, alleged violations of freedom of speech and human rights, and the secrecy of undisclosed contracts between schools and the Hanban. It concluded that "academic freedom cannot have a price tag", and recommended that if universities will not publish their CI agreements, the programs should end. The official Chinese news agency Xinhua "hit back with an angry editorial" on 24 June, saying the claims by the AAUP and others that CIs "function as an arm of the Chinese state and are pushing political agendas", actually "expose not so much communist propaganda as their own intolerance of exotic cultures and biased preconceived notions to smear and isolate the CPC".
United States
Columbia University received $1 million in Hanban funds over five years, to begin a CI. Professor Robert Barnett, the director of the Modern Tibetan Studies Program, described a "strange silence about Tibet and other sensitive issues when it comes to Columbia, academics, and talks of China." Barnett said, "The issue is not China wants to promote itself and pay for Chinese to be taught. The issue is it wants to have a presence in the campus and much more than that. It wants to have a presence in the faculty and in teaching departments." Lening Liu, director of the Confucius Institute at Columbia, said that it was "committed to academic integrity and that it would reject any attempt by Hanban to censor its research." Other academics have questioned how universities should respond when foreign governments limit academic freedom abroad. Since the 2001 publication of Columbia University professor Andrew J. Nathan's Tiananmen Papers, he and several other faculty members have been denied visas to China, and the Chinese government shut down the Modern Tibetan Studies Program's study abroad program in Tibet.
Over 170 University of Chicago faculty members petitioned president Robert Zimmer against the establishment, without Faculty Senate approval, of a CI. The petition called Confucius Institutes "an academically and politically ambiguous initiative" sponsored by the PRC, and said the university risked having its own reputation used to "legitimate the spread" of CIs in the United States and around the world.
In late October 2013, Marshall Sahlins, a professor emeritus at the University of Chicago, published the article "China U: Confucius Institutes censor political discussions and restrain the free exchange of ideas. Why, then, do American universities sponsor them?" arguing that universities like the University of Chicago should take the lead in canceling the arrangement. Writing in Forbes, the Irish journalist Eamonn Fingleton says, "In one of the most scandalous sell-outs in intellectual history, more and more universities now accept funding from the Beijing Ministry of Education". He calls the CI program a "Chinese mega-blooper", and says that largely thanks to Sahlins' leadership, "academic staff at many universities have begun agitating to rid campuses of the phenomenon."
In 2014, Professor Sahlins wrote Confucius Institutes: Academic Malware because incidents of academic malpractice in CIs, "from the virtually unnoticeable to the publicly notorious, are disturbingly common". Sahlins told the Times Higher Education that his book did not represent some sort of "rabid anti-communism of a McCarthyite or Cold War sort – as defenders of Confucius Institutes have claimed", but rather, the issue is the preservation of the "values of academic freedom and intellectual autonomy upon which universities in the US and most of the world are founded."
According to a Chronicle of Higher Education article, since the first Confucius Institute in the United States was established at the University of Maryland in 2004, "there have been no complaints of the institutes' getting in the way of academic freedom on American campuses"; the same article goes on to say that the Institutes are "distinct in the degree to which they were financed and managed by a foreign government."
Stanford University was initially offered $4 million to host a CI and endow a Confucius Institute Professorship in Sinology, but Hanban requested that the professor not discuss "delicate issues". After Stanford refused based on academic freedom grounds, Hanban accepted making an unrestricted gift, and the university plans to use the money for a professorship in classical Chinese poetry. Dean Richard Saller, who is also the CI director, explained the Hanban prizes the Stanford relationship too much to jeopardize it by interfering with academic freedom.
In 2009, North Carolina State University canceled a planned appearance by the Dalai Lama to speak on its Raleigh campus, citing concerns about a Chinese backlash and a shortage of time and resources. Provost Warwick Arden said "China is a major trading partner for North Carolina," and a CI presents an "opportunity for subtle pressure and conflict." However, in 2010, the Dalai Lama spoke at Stanford University and Miami University (Ohio) – both institutions have Confucius Institutes.
On 28 March 2012, the United States House Foreign Affairs Subcommittee on Oversight and Investigations held a hearing on "The Price of Public Diplomacy with China," focusing upon Chinese propaganda efforts in the U.S., including Confucius Institutes on university campuses. Representative Dana Rohrabacher said, "The two pillars of America's status as an open society are freedom of the press and academic freedom. Communist China, which does not believe in or allows the practice of either type of freedom, is exploiting the opportunities offered by America to penetrate both private media and public education to spread its state propaganda." Steven W. Mosher testified, "there have been allegations of Confucius Institutes undermining academic freedom at host universities, engaging in industrial and military espionage, monitoring the activities of Chinese students abroad, and attempting to advance the Chinese Party-State's political agenda on such issues as the Dalai Lama and Tibet, Taiwan independence, the pro-democracy movement abroad, and dissent within China itself." Responding to Mosher's testimony, Rohrabacher argued, "It appears as though Beijing is able to expand its campaign against academic freedom from China to America when U.S. universities value Chinese favors and money more than truth and integrity."
The US Department of State issued a 17 May 2012 directive stating that the Chinese professors at university-based CIs were violating their J-1 visas by teaching in schools at the precollege level and would have to return to China by 30 June to apply for a new visa. In addition, the institutes would be required to obtain US academic accreditation. Chinese officials reportedly applied pressure on Washington in response. On 24 May, State Department spokesperson Victoria Nuland said there was "a mess-up in the processing in general" and called the original directive "sloppy and incomplete." The State Department said it would arrange the appropriate visa categories for Chinese teachers, without them needing to leave the country and re-apply. Xu Lin, head of the Hanban, told a CI conference in Edinburgh, "The US government hurt our feelings, but Confucius Institutes across Europe have done a great job, especially with cultural promotion, which is not surprising given Europe's rich history and culture."
In April 2014, over 100 professors at the University of Chicago signed a petition calling for a University Senate Council vote against renewing the university's CI contract, saying that the Hanban's control of hiring and training teachers "subjects the university's academic program to the political constraints on free speech and belief that are specific to the People's Republic of China." The CI director Dali Yang denied these charges and said, "Our Confucius Institute does not offer classes of its own; the teachers participate in the University of Chicago Chinese language program." Marshall Sahlins said that if the U. of C. withdrew from the Confucius Institutes, other universities "will think twice about joining or renewing their contracts."
Media widely reported on this protest by U. of C. faculty. Historian Bruce Cumings, who signed the petition, noted that China had recently fired prominent faculty members for their political views, and warned, "American universities should not be taking money or institute funds from governments that are jailing professors and that do not provide academic freedom in their own country." Anthony C. Yu, a professor emeritus of Chinese, recalled speaking at a large gathering of CI teachers employed on American campuses, and finding most weren't trained language instructors and only a few were fluent in English. When George Washington University announced the establishment of a CI in 2013, a dean supported the program because the University of Chicago had also started one, but following the recent petition there, GW is changing the Faculty Code to protect academic freedom, particularly for professors studying Chinese policy, who could have cause to fear censorship by the Confucius Institute.
On 25 September 2014, the University of Chicago stated that they had suspended negotiations to renew its CI contract because "recently published comments about UChicago in an article about the director-general of Hanban are incompatible with a continued equal partnership." This referred to Xu Lin's interview with the Jiefang Daily, the official newspaper of the Communist Party in Shanghai. The article states that following the UChicago faculty petition, Xu Lin wrote a letter to Chicago's president and called the university representative in Beijing (where Chicago has a research center), "with only one line: 'If your school decides to withdraw, I will agree to it.' Her attitude made the other side anxious. The school quickly responded that it will continue to properly manage the Confucius Institute." Hanban Vice Director Hu Zhiping responded to Chicago's decision with a written statement: "Hanban thinks it's a pity that the University of Chicago has made the public statement before finding out the truth. Since Confucius Institute is a collaboration program, both sides can make a choice." Dali Yang, the Chicago CI director, said the institute would continue to support existing projects after the current five-year agreement expired on 29 September.
Several UChicago faculty members commented on the CI closure. Bruce Lincoln, Professor of the History of Religions at Chicago, summarized the lengthy negotiations; the university administrators "accurately represented the institution's core values" when they argued against having a CI on campus, while the Chinese officials were "heavy-handed, condescending, and difficult." Marshall Sahlins, an emeritus professor who helped lead the fight against the CI, said the newspaper article "fulsomely" praised Xu Lin, and told The Wall Street Journal, "They knew that this was a dubious operation to begin with. They knew that there was a large opposition from an important segment of the faculty. And then, given that, the newspaper report simply triggered or changed the balance definitively."
Gary Rawnsley, a British expert on international communication, said that Xu Lin could not have picked a worse time "to assert her imaginary authority", and the Business Spectator concluded this hardline behavior highlights one of the biggest problems for Beijing's charm offensive. "It still relies on officials like Xu, who still think and act like party ideologues who like to assert their authority and bully people into submission."
The Economist called Xu Lin's statement "a boastful challenge" and said opponents of Confucius Institutes will claim this as a victory for academic freedom. The Diplomat said that the current CI program of 465 institutes is heavily weighted toward the West, with 97 located in the U.S. but only 95 institutes in all of Asia. However, if backlash in the West continues to grow, the number of CIs "may plateau in the West while there remains immense potential for growth in other regions", including Africa, the Middle East, and Latin America.
The official newspaper of the Communist party, the People's Daily responded to the University of Chicago's closure of its Confucius Institute.
On 1 October 2014, Pennsylvania State University confirmed that it would close its Confucius Institute on 13 December 2014 when the contract expires, with its dean saying through a written statement that several of the university's goals are "not consistent with those of the Office of Chinese Languages Council International, known as the Hanban, which provides support to Confucius Institutes throughout the world."
In an interview, a former director of the Penn State Confucius Institute, Eric Hayot, said he suspected that the Confucius Institute may not have been providing enough of a return on its investment. "I will say that in my experience as CI director one of the major frustrations with the relationship was that we consistently had more ambitious ideas for the ways CI funding could be used", such as research projects proposed by Penn State professors on topics concerning the environment, science, and politics. He said the Hanban regularly rejected such proposals "too far outside the official CI ambit (which they would tell us was mainly 'cultural')," "A lot of what the Hanban wanted us to do didn't make sense given our institution, faculty population, and student population," said Professor Hayot, who was not involved in the CI contract negotiations this summer. "Had they been flexible, it would have helped Confucius Institute succeed here."
The Telegraph said China's effort to project soft power "has suffered another serious setback", and the UChicago and Penn State closures represent a major blow to China's attempt at using the government-funded institutes to improve its image around the world.
Henry Reichman, a vice president of the AAUP and chairman of the committee that issued a statement condemning Confucius Institutes, said, "There is clearly a growing sense that these academic centers need to be looked at a little more carefully ... I suspect U Chicago and Penn State won't be the only ones to come to the conclusion that a relationship with these institutes is not really worth it."
A Bloomberg News editorial mentioned the three CI closures within two weeks and says, "If the institutes are meant to be insidious vehicles of Chinese soft-power indoctrination, they're doing a terrible job. In fact, they appear to be causing more damage than good to China's image abroad."
On 4 December 2014, the United States House Foreign Affairs Subcommittee on Africa, Global Health, Global Human Rights and International Organizations held a hearing entitled "Is Academic Freedom Threatened by China's Influence on U.S. Universities?". Chairman Chris Smith said, "U.S. colleges and universities should not be outsourcing academic control, faculty and student oversight or curriculum to a foreign government", and called for a Government Accountability Office study into academic agreements between American universities and China. The testimony of Perry Link, a Chinese studies professor at UC Riverside, made three policy recommendations: American university administrators should adopt a policy of "consciously staking out the broadest of fields" in their programs with China, the U.S. government should fund Chinese-language programs in the U.S., and should withhold visas for CI instructors as long as China continues to withhold visas for American scholars on political grounds. On the day after the House hearing, PRC Ministry of Foreign Affairs spokeswoman Hua Chunying responded, "All Confucius Institutes in the U.S. are there because they were applied for by U.S. universities of their own will. We have assisted with supplying teachers and textbooks at the request of the U.S. side but have never interfered with academic freedom."
In August 2020, the United States Department of State designated the headquarters of the Confucius Institutes in the U.S. as a "foreign mission" of China.
As of 2022, all of the Confucius Institutes located on SUNY campuses were closed because federal research funding was jeopardized. The 2021 National Defense Authorization Act is the act that could restrict federal research funding to universities that host Confucius Institutes.
United Kingdom
In Britain, there are at least 29 Confucius Institutes, the second largest number in the world after the United States, attached to major universities such as Edinburgh, Liverpool, Manchester, Newcastle, Nottingham, Cardiff and University College London. There are also 148 Confucius 'classrooms' in schools around the United Kingdom, according to the Hanban website. As part of its wider and ongoing work on China, the Conservative Party Human Rights Commission held an inquiry into China's Confucius Institutes in February 2019. "This inquiry asked the fundamental question: Are Confucius Institutes a benign and even positive presence, enhancing better understanding and cooperation with China, or a negative influence, threatening and restricting freedom of expression and academic freedom? Our conclusion is that on balance, given the evidence we have received, and while the teaching of Chinese language and culture should be welcomed and encouraged, Confucius Institutes as they are currently constituted threaten academic freedom and freedom of expression in universities around the world and represent an endeavour by the Chinese Communist Party to spread its propaganda and suppress its critics beyond its borders."
Israel
In 2008, Tel Aviv University officials shut down a student art exhibition depicting the "oppression of Falun Gong" in China. A Tel Aviv District Court judge subsequently ruled the university "violated freedom of expression and succumbed to pressure from the Chinese Embassy." The judge noted the dean of students "feared that the art exhibit would jeopardize Chinese support for its Confucius Institute and other educational activities."
Australia
New South Wales Greens MP John Kaye said that although teaching Chinese language and culture is important, "Students are being denied a balanced curriculum which explores controversial issues, such as human rights violations and Taiwan, because critical examination might upset the Chinese government." Fellow Greens MP Jamie Parker organized a petition with more than 10,000 signatures, calling for removing the Confucius Classroom Program from local schools. NSW Minister for Education Adrian Piccoli defended the classes, and noted the Chinese language syllabuses did not include the study of political content. Shuangyuan Shi, director of Confucius Institute in Sydney, noted the institute primarily focuses on language, and teachers are not there to draw conclusions for students in regards to controversial subjects. Senior Department of Education officials acknowledge the institutes play an important role in fostering greater literacy in Asian languages, they admit to concerns about China's influence over the program's content. They say that the treatment of "sensitive topics" such as human rights is usually well handled by teachers. Furthermore, the staff at the Sydney institutes noted Beijing never threatened their academic freedom.
After the University of Sydney's Institute for Democracy and Human Rights organized a 2013 talk by the Dalai Lama, the university warned that they could not use its logo, allow media coverage, or permit entry to the event by Tibet activists—forcing organizers to move the event off campus. University officials decided, "there was a better way of doing it. A small group, a small section of the student body, was really not the best thing." Sarah Hanson-Young, an Australian Greens senator, said "As a democratic country, we should be encouraging more open and frank discussion about the current situation in Tibet, not banning the country's spiritual leader from addressing students and staff at universities." A spokesperson for the activist Australia Tibet Council said the university had given in to China. "They have compromised their academic freedom and integrity, and it also sends a disheartening message to the Tibetan people," more than 100 of whom have died in recent self-immolation protests. June Teufel Dreyer, a University of Miami (Florida) professor of political science, claims that Confucius Institutes have distorted history, citing universities in Australia inviting speakers "to shill for the government and talk about how happy all the Tibetans were". A Joint Conference of Australia's 13 Confucius Institutes was held in Sydney on 4 September 2014, intending to increase the CI network's "visibility in Australia's industry and public policy making communities".
Canada
In December 2013, the Canadian Association of University Teachers passed a resolution calling on all Canadian universities and colleges that currently host CIs on their campuses to cease doing so, and those contemplating such arrangements to pursue them no further. This action followed upon the Université de Sherbrooke in Quebec closing its Confucius Institute, the University of Manitoba voting against hosting a CI out of concerns over political censorship, and McMaster University cancelling its CI contract following an instructor's human rights complaint. CAUT executive director James Turk said Canadian universities that agree to host CIs are compromising their own integrity by allowing the Hanban to have a voice in academic matters such as curriculum, texts, and topics of class discussion, describing such interference as a "fundamental violation of academic freedom." Turk described CIs as "essentially political arms of the Chinese government", which restrict the free discussion of topics Chinese authorities deem controversial, and "should have no place on our campuses."
At 19 June 2014 meeting of the Toronto District School Board, Canada's largest school board, trustees voted to postpone the planned September startup of a Confucius Institute, in order to more closely examine a 2012 agreement that chair Chris Bolton unilaterally negotiated with the Hanban. On the morning of the meeting, Bolton suddenly resigned and was not available to answer questions. Many trustees complained that they had not received enough information about the partnership and were caught off guard when they received hundreds of emails and phone calls from parents protesting against CIs. An editorial in The Globe and Mail said Bolton "showed a stunning lack of judgment", and warned that "the Confucius Institute functions as little more than a long arm of the Chinese state, pushing its political agenda under the guise of simple language instruction."
The deputy director-general of the Hunan Provincial Department of Education sent a letter to the TDSB that said, "If the Confucius Institute in Toronto was suspended, there would be a great damage to the relationship between the two sides, which is hard for us to accept."
On 30 September 2014, the TDSB's Planning and Priorities Committee voted to terminate the Confucius Institute program, leaving the final decision to the full board meeting at the end of October. TDSB chair Mari Rutka declared she did not feel reassured that going forward would be a good move, and said, "There have been too many concerns raised, I think, again, we have the examples of a number of other institutions that have decided not to go on with this." Trustees said they had heard both sides of the argument, and received pressure from both parents alarmed over China's control of the programs and from Chinese officials who warned them that dissolving the partnership would endanger the TDSB's most lucrative market for fee-paying international students. The CI issue has been contentious, involving a website and petitions. The committee heard from 10 speakers, half against the contract (including a former Canadian Security Intelligence Service Asia/Pacific chief who warned the institutes are a "Trojan horse"), and half in favor (a spokesperson from the Confederation of Chinese Canadian Organizations in Toronto who said the issue was not political but "about culture and language"). A newspaper editorial described CIs as state-supported, state-directed entities controlled by a "one-party regime that recently evolved from Marxism-Leninism into what can be best described as a novel form of non-democratic elitism with kleptocratic tendencies."
At the 30 October 2014 full meeting, the TDSB voted 20–2 to cancel the CI contract. Trustee Pamela Gough said her concern was that "the Confucius Institute is directly controlled by the Communist Party of China, and there is irrefutable evidence that the party exerts its influence through [the institute]". In response to the TDSB rejection, an op-ed from the state-run China Daily called the criticisms "unfair" and accused CI critics of having "a deep bias against China". David Mulroney, a former Canadian ambassador to China, said, "We're seeing really the end of the free ride that Confucius Institutes have had, particularly in North America".
Scandinavia
In December 2014, Stockholm University, the first university in Europe to host a Confucius Institute, announced it was terminating the program. Press coverage of the Braga incident in the Swedish press was said to have influenced the decision. "Generally it is questionable to have, within the framework of the university, institutes that are financed by another country," said the university's chancellor. No major university in Sweden now hosts a Confucius Institute.
Portugal
A censorship effort by the Confucius Institute's international director Xu Lin against Taiwan occurred in Portugal in July 2014. Upon her arrival on 23 July 2014, at a European Sinology conference partly organized by the director of the Confucius Institute at the University of Minho, Braga, Portugal, the international head of the Confucius Institutes, Xu Lin, ordered censorship of "important pages" that included references to Taiwan institutions, one of which, the Chiang Ching-kuo Foundation, was also funding the conference as it has for the past 20 years.
On the first day of the annual conference of the European Association for Chinese Studies (EACS), with several hundred attendees, Xu Lin ordered the programs seized. Four pages were torn out of the program before they were re-issued to conference attendees the next day.
The president of the EACS ordered 500 copies of the deleted pages to be distributed to attendees and issued a report on the incident. The U.S. online university site Inside Higher Ed quoted Marshall Sahlins, professor emeritus at the University of Chicago and a leading critic of the Confucius Institutes, who said that this incident illustrated the Confucius Institutes provision that programming they fund must abide by Chinese laws, including those restricting speech; "Moreover they're going to enforce them the way they do in China, which is not so much by going to court... but simply by fiat." Taiwan's cabinet-level Mainland Affairs Council issued a reproach over the censorship incident, saying, "The mainland should deal with Taiwan's participation in activities on international occasions pragmatically. If there is no respect for each other, the development of cross-strait relations will be seriously hurt."
The Christian Science Monitor reported that the censorship has made more academics in the US, UK, Canada, and Australia grow uneasy with Confucius Institutes. Eamonn Fingleton suggests that perhaps the most embarrassing aspect of the whole Braga Incident is that Beijing has reversed itself on the "hot-button issue at the center of the entire controversy. After vehemently denying for years that the Confucius Institutes have any kind of censorship agenda, Beijing has now tacitly acknowledged that this was false."
The Parliament Magazine said of the Braga Incident that European higher education should remain independent and not be turned into "an instrument of outright propaganda of the Chinese Communist party."
In December 2014, the BBC interviewed Xu Lin in Beijing. During the interview, BBC reporter John Sudworth asked about the Braga incident, but afterwards Xu Lin objected and insisted that large portions of the interview to be deleted. The BBC refused the Chinese censorship demand. One of the points she made in the interview is that Taiwan belongs to China, and therefore outsiders have no business interfering. "Xu Lin not only refused to answer difficult questions, she also politicised the Confucius Institutes and reinforced the idea that they are led by dogmatists," commented Gary Rawnsley, professor of Public Diplomacy at Aberystwyth University, Wales. The Wall Street Journal reported on Xu's BBC interview, and said, "Critics have argued that China's Confucius Institutes pose a threat to academic freedom in the United States, Canada, Europe and beyond. Now the Beijing official in charge of them has confirmed it."
Russia
On 27 July 2015, a prosecutor filed a complaint to the city court in Blagoveshchensk Amur Oblast, Russia, asking that the court shut down the Blagoveschensk State Pedagogical University Confucius Institute on the grounds that it is violating Russian law by not being registered as a non-commercial organization, and thus, foreign teachers have no legal grounds to work at the institute. The prosecutor's statement said that instead of being a part of the university, the CI should be registered as a foreign cultural center.
Confucius Classrooms
The Confucius Classroom program partners with local secondary schools or school districts to provide teachers and instructional materials.
United Kingdom
Campaign groups raised concerns about Confucius Classrooms in the UK in 2015. Isabel Hilton, a broadcaster and writer whose own work was censored by the Confucius Institute, said: "State control undertaking in China in the teaching of culture means contestation is not really allowed. If this is happening in our schools where people are not familiar with the Chinese buying their way into our education system, we ought to ask serious questions about whether that's a good thing." Campaigning group Free Tibet claimed that lessons are limited by "terms effectively determined by a government that suppresses free speech inside its own borders and which is responsible for widespread human rights abuses." The group also raised concerns that money from the Chinese government had been accepted without "proper, democratic scrutiny."
United States
In one instance, the Hacienda La Puente Unified School District Board of Education encountered strong community opposition to establishing a Confucius Classroom at Cedarlane middle school in Hacienda Heights, which is "a heavily Hispanic community with a majority-Chinese school board." A San Gabriel Valley Tribune editorial compared this CI program as "tantamount of asking Hugo Chavez to send his cadres to teach little American kids economics." History teacher Jane Shults described criticisms of Confucius Classrooms as "jingoistic, xenophobic, not overly rational and it's really shades of McCarthyism." One member of the Hacienda La Puente school board, Norman Hsu, said it wasn't worth pushing the issue, since, without California credentials, the teacher would not have been permitted to operate as a full-fledged instructor anyway. Another school board member, Jay Chen, characterized the Confucius Classroom scheme's opponents, "What they all share in common, besides not having any children in the district (many don't even live in the district), are steadfast accusations that the school board is trying to promote Communism in the classroom." Chen concluded that xenophobic "Anti-Sinoism" was causing the Hacienda La Puente disagreements. University of Southern California public diplomacy professor Nicholas J. Cull said, "I'm sure this will become a standard dispute. People in America are very suspicious of ideas from the outside."
The Bibb County Public School District, which includes Macon, Georgia, mandated that Mandarin Chinese would become a required subject for every student, pre-K through 12th grade. Although the superintendent described the agreement for the Confucius Classroom to supply the Chinese language teachers as "a win-win for everyone," some parents were critical. A few feared a "Communist regime enacting its geopolitical agenda on their children", but most had practical concerns, such as whether local students would benefit more from learning Spanish than Chinese as a foreign language.
David Coleman (education) president of the College Board announced plans with Hanban to open Confucius Classrooms in 20 school districts across the U.S.
Hiring policies
In 2011, the instructor hiring policies posted publicly on Hanban's website stated that candidates for teaching positions should be "aged between 22 and 60, healthy, no record of participation in Falun Gong and other illegal organizations, and no criminal record". Hanban representatives in North America defended the policy, stating that Confucius Institutes must follow Chinese law.
In 2012, The Globe and Mail reported that Sonia Zhao quit her teaching position at McMaster University's Confucius Institute in Hamilton, Ontario, and sought political asylum in Canada based on religious discrimination. In a complaint filed to the Human Rights Tribunal of Ontario, Ms. Zhao stated she was forced to hide her belief in the Falun Gong spiritual movement, which the Chinese government calls an illegal "evil cult", and argued that McMaster "is giving legitimization to discrimination." She told an interviewer that during her CI training in Beijing, she was told that if students asked about Tibet or other sensitive topics, "Don't talk about this. If the student insists, you just try to change the topic, or say something the Chinese Communist Party would prefer." Andrea Farquhar, McMaster's assistant vice-president of public and government affairs, said the university was "looking for clarity" from its Chinese partners on aspects of their agreement, notably hiring practices. Having lent its name to the Confucius Institute on its campus, Ms. Farquhar said McMaster was insisting that Canadian laws and expectations be respected. In 2013, McMaster University announced they would close their Confucius Institute. Andrea Farquhar explained that after months of making a concerted effort to save their 5-year partnership with Hanban, "We were uncomfortable, and felt that it didn't reflect the way the university would do hiring", and explained that McMaster's Chinese partners replied with a letter expressing "some disappointment." Ms. Zhao, a Chinese citizen, has since been granted refugee status in Canada.
Closures
While many universities (such as the University of Pennsylvania and University of Manitoba) have refused Hanban offers to host Confucius Institutes, a few hosting universities have decided to terminate their 5-year renewable CI contracts: one Japanese university in 2010, one French and two Canadian in 2013, one Canadian, one Swedish, and two American universities in 2014, and one German university in 2015. Regarding the recent international closures of Confucius Institutes, a July 2015 article in The Diplomat said that although nations like Japan use soft power to promote positive images of themselves for the sake of political profit, China uses soft power for lies and censorship, but the world "sees through its con".
McMaster University
On 7 February 2013, Canada's McMaster University terminated its CI contract owing to an instructor's human rights complaint and the university's lack of control over hiring CI employees. The Hanban replied with a letter expressing "some disappointment." In the previous year, Sonia Zhao, a Chinese national, quit her teaching position at McMaster's Confucius Institute and sought political asylum in Canada based on religious discrimination. Ms. Zhao filed a complaint with the Human Rights Tribunal of Ontario, stating that McMaster was "giving legitimization to discrimination" because she was forced to hide her belief in the Falun Gong spiritual movement, for which the Hanban would fire her. The university insisted that the Confucius Institute respect Canadian laws and expectations on hiring and firing practices.
University of Lyon
On 24 September 2013, France's University of Lyon closed their Confucius Institute at Lumière University Lyon 2 and Jean Moulin University Lyon 3, which had been established in 2009. Gregory B. Lee, board chair of the CI said its director was "taking his instructions directly from Beijing" and "questioned the content of our courses."
Université de Sherbrooke
On 31 December 2013, Canada's Université de Sherbrooke in Quebec closed their Confucius Institute after months of failed negotiations, saying that the Hanban arrangement no longer met the university's international plans. On 17 December 2013, the Canadian Association of University Teachers passed a resolution calling on all Canadian universities and colleges that currently host CIs on their campuses to cease doing so, and those contemplating such arrangements to pursue them no further. Of the six Canadian universities that sent replies to the CAUT, only the Université de Sherbrooke said it would be severing ties with the CI.
Montreal's Dawson College, which partnered with Université de Sherbrooke in 2007 to establish the Confucius Institute in Quebec, decided to continue hosting. Agents from the Canadian Security Intelligence Service interviewed Meng Rong, director of the CI in Quebec, showed her a list of names, and asked if she could identify anyone. Meng told an interviewer that the CI had "nothing to do with politics or spying".
University of Chicago
On 25 September 2014, the University of Chicago suspended lengthy negotiations to renew its Confucius Institute contract, citing director-general Xu Lin's boastful claims in the official Communist Jiefang Daily that she made the university fear cancelling with one sentence—"If your school decides to withdraw, I will agree to it."
Pennsylvania State University
On 1 October 2014, Pennsylvania State University announced that it will discontinue hosting a Confucius Institute at the end of the year when their contract expires. The university spokesperson said their goals are not consistent with those of the Hanban, or Office of Chinese Languages Council International.
Toronto District School Board
On 30 October 2014, the Toronto District School Board, which oversees public schools with 232,000 students, voted to cancel their CI contract. Trustee Pamela Gough said it was clear that "this partnership is not aligned with TDSB and community values, and its continuation is not appropriate."
Stockholm University
On 20 December 2014 Stockholm University, Sweden, announced that the Stockholm Confucius Institute will be closed by the end of June 2015. According to the vice-chancellor of Stockholm University the new contracts for the Confucius Institutes are not in line with how Swedish universities are governed.
Stuttgart Media University and University of Hohenheim
In 2014, the Hanban signed a contract with the Stuttgart Media University and University of Hohenheim to open a CI in Stuttgart, Germany, but in June 2015, the universities abandoned the plan. A spokesperson blamed the decision on a failure to find the necessary support for the Confucius Institute, nonetheless, a Students for a Free Tibet press release said their "Say No to Confucius Institutes" campaign's opposition to the Stuttgart plan had been successful, and declared a victory for democratic values and academic freedom worldwide.
Tulane University
In 2013, Tulane entered into an agreement with East China Normal University to create a Confucius Institute. After 2018, the institute no longer exists at Tulane.
List of closures
Source
References
External links
Confucius Institute Online
Dan Harris, Chinese Becomes New Language in the Classroom, ABC News, 15 October 2012
Confucius Institutes Exposed, China's Forbidden News, 28 August 2013
The War to Resist US Aggression and Aid Korea, mirror of deleted Confucius Institute Online video, Blip
英媒:西方大學重新考慮中國孔子學院 [Western Universities Reconsider Confucius Institutes], BBC Chinese, 4 April 2013
China U: Confucius Institutes censor political discussions and restrain the free exchange of ideas. Why, then, do American universities sponsor them? By Marshall Sahlins. The Nation, 18 November 2013.
Sahlins on Confucius Institutes, four-part lecture by Marshall Sahlins, PricklyParadigmTV, YouTube.
Criticism of academia
Foreign relations of China
Chinese-language education
Confucius Institute
Sinology
Political controversies
Education controversies
Controversies in the United States
|
3694774
|
https://en.wikipedia.org/wiki/Formal%20science
|
Formal science
|
Formal science is a branch of science studying formal language disciplines concerned with formal systems, such as logic, mathematics, statistics, theoretical computer science, artificial intelligence, information theory, game theory, systems theory, decision theory, and theoretical linguistics. Whereas the natural sciences and social sciences seek to characterize physical systems and social systems, respectively, using empirical methods, the formal sciences are language tools concerned with characterizing abstract structures described by symbolic systems. The formal sciences aid the natural and social sciences by providing information about the structures used to describe the physical world, and what inferences may be made about them.
Etymology
The modern usage of the term formal sciences, in English-language literature, occurs at least as early as 1860, in a posthumous publication of lectures on philosophy by Sir William Hamilton wherein logic and mathematics are listed as formal sciences. Going even further back to 1819, a German-language textbook on logic was published by Wilhelm Esser, elucidating the significance of the designation formal science (Formalwissenschaft) as applied to logic; an English-language translation of it is provided in William Hamilton's lecture:
History
Formal sciences began before the formulation of the scientific method, with the most ancient mathematical texts dating back to 1800 BC (Babylonian mathematics), 1600 BC (Egyptian mathematics) and 1000 BC (Indian mathematics). From then on different cultures such as the Greek, Arab and Persian made major contributions to mathematics, while the Chinese and Japanese, independently of more distant cultures, developed their own mathematical tradition.
Besides mathematics, logic is another example of one of oldest subjects in the field of the formal sciences. As an explicit analysis of the methods of reasoning, logic received sustained development originally in three places: India from the , China in the , and Greece between the and the . The formally sophisticated treatment of modern logic descends from the Greek tradition, being informed from the transmission of Aristotelian logic, which was then further developed by Islamic logicians. The Indian tradition also continued into the early modern period. The native Chinese tradition did not survive beyond antiquity, though Indian logic was later adopted in medieval China.
As a number of other disciplines of formal science rely heavily on mathematics, they did not exist until mathematics had developed into a relatively advanced level. Pierre de Fermat and Blaise Pascal (1654), and Christiaan Huygens (1657) started the earliest study of probability theory. In the early 1800s, Gauss and Laplace developed the mathematical theory of statistics, which also explained the use of statistics in insurance and governmental accounting. Mathematical statistics was recognized as a mathematical discipline in the early 20th century.
In the mid-20th century, mathematics was broadened and enriched by the rise of new mathematical sciences and engineering disciplines such as operations research and systems engineering. These sciences benefited from basic research in electrical engineering and then by the development of electrical computing, which also stimulated information theory, numerical analysis (scientific computing), and theoretical computer science. Theoretical computer science also benefits from the discipline of mathematical logic, which included the theory of computation.
Branches
Branches of formal science include computer science, mathematics, statistics, information science and systems science.
Differences from other sciences
As opposed to empirical sciences (natural and social), the formal sciences do not involve empirical procedures. They also do not presuppose knowledge of contingent facts, or describe the real world. In this sense, formal sciences are both logically and methodologically a priori, for their content and validity are independent of any empirical procedures.
Therefore, straightly speaking, formal science is not an empirical science. It is a formal logical system with its content targeted at components of experiential reality, such as information and thoughts. As Francis Bacon pointed out in the 17th century, experimental verification of the propositions must be carried out rigorously and cannot take logic itself as the way to draw conclusions in nature. Formal science is a method that is helpful to empirical science but cannot replace empirical science.
Although formal sciences are conceptual systems, lacking empirical content, this does not mean that they have no relation to the real world. But this relation is such that their formal statements hold in all possible conceivable worlds – whereas, statements based on empirical theories, such as, say, general relativity or evolutionary biology, do not hold in all possible worlds, and may eventually turn out not to hold in this world as well. That is why formal sciences are applicable in all domains and useful in all empirical sciences.
Because of their non-empirical nature, formal sciences are construed by outlining a set of axioms and definitions from which other statements (theorems) are deduced. For this reason, in Rudolf Carnap's logical-positivist conception of the epistemology of science, theories belonging to formal sciences are understood to contain no synthetic statements, being that instead all their statements are analytic.
See also
Philosophy
Science
Rationalism
Abstract structure
Abstraction in mathematics
Abstraction in computer science
Formalism (philosophy of mathematics)
Formal grammar
Formal language
Formal method
Formal system
Form and content
Mathematical model
Mathematics Subject Classification
Semiotics
Theory of forms
References
Further reading
Mario Bunge (1985). Philosophy of Science and Technology. Springer.
Mario Bunge (1998). Philosophy of Science. Rev. ed. of: Scientific research. Berlin, New York: Springer-Verlag, 1967.
C. West Churchman (1940). Elements of Logic and Formal Science, J.B. Lippincott Co., New York.
James Franklin (1994). The formal sciences discover the philosophers' stone. In: Studies in History and Philosophy of Science. Vol. 25, No. 4, pp. 513–533, 1994
Stephen Leacock (1906). Elements of Political Science. Houghton, Mifflin Co, 417 pp.
Bernt P. Stigum (1990). Toward a Formal Science of Economics. MIT Press
Marcus Tomalin (2006), Linguistics and the Formal Sciences. Cambridge University Press
William L. Twining (1997). Law in Context: Enlarging a Discipline. 365 pp.
External links
Interdisciplinary conferences — Foundations of the Formal Sciences
Branches of science
|
32813716
|
https://en.wikipedia.org/wiki/Ex%20Falso
|
Ex Falso
|
Ex Falso is a free and open source, cross-platform audio tag editor and library organizer. It is a user interface sharing the same backend software as Quod Libet, minus the ability to play music. It is developed by the same software team responsible for Quod Libet.
Tag editing Features
Complete Unicode support
Changes to multiple files at once, even if files are in different formats
Ability to tag files based on filenames with fully configurable formats
Customizable renaming of files based on their tags and a user-supplied format
Human readable tag references, e.g. <artist> or <title> rather than %a or %t, with support for "if not-null x else y" logic (e.g. <albumartist|albumartist|artist>)
Fast track renumbering
Add / edit bookmarks within files
See also
List of tag editors
References
External links
2004 software
Cross-platform free software
GNOME Applications
Free audio software
Free software programmed in Python
Software that uses PyGObject
Tag editors
Tag editors for Linux
Tag editors that use GTK
|
2062303
|
https://en.wikipedia.org/wiki/List%20of%20optical%20disc%20authoring%20software
|
List of optical disc authoring software
|
This is a list of optical disc authoring software.
Open source
Multi-platform
cdrtools, a comprehensive command line-based set of tools for creating and burning CDs, DVDs and Blu-rays
cdrkit, a fork of cdrtools by the Debian project
cdrdao, open source software for authoring and ripping of CDs in Disk-At-Once mode
DVDStyler, a GUI-based DVD authoring tool
libburnia, a collection of command line-based tools and libraries for burning discs
Linux and Unix
Brasero, a GNOME disc burning utility
dvd+rw-tools, a package for DVD and Blu-ray writing on Unix and Unix-like systems
K3b, the KDE disc authoring program
Nautilus, the GNOME file manager (includes basic disc burning capabilities)
Serpentine, the GNOME audio CD burning utility
Xfburn, the Xfce disc burning program
X-CD-Roast
Windows
InfraRecorder (based on cdrkit and cdrtools)
DVD Flick (ImgBurn is included)
Freeware
Windows
CDBurnerXP
ImgBurn
Ashampoo Burning Studio
DeepBurner Free
DVD Decrypter
DVD Shrink
Mac OS X
Disco
Commercial proprietary
Mac OS X
Adobe Encore
DVD Studio Pro
MacTheRipper
Roxio Toast
Linux
Nero Linux
Windows
Adobe Encore
Alcohol 120%
Ashampoo Burning Studio
AVS Video Editor
Blindwrite
CDRWIN
CloneCD
CloneDVD
DeepBurner
DiscJuggler
Roxio Creator
MagicISO
Nero Burning ROM
Netblender
SEBAS
UltraISO
See also
Comparison of disc authoring software
Optical disc authoring software
Optical disc authoring
es:Programas grabadores de discos ópticos
|
53444968
|
https://en.wikipedia.org/wiki/Splashtop
|
Splashtop
|
Splashtop is a family of remote-desktop software and remote support software, developed by Splashtop Inc. Splashtop enables users to remotely access or remotely support computers from desktop and mobile devices. Splashtop enables remote computer access for businesses, IT support and help desks, MSPs, and educational institutions.
Products
All Splashtop products require an internet connection on both computers to operate. The company charges an annual subscription fee for use of its products.
Splashtop Business Access
Remote computer access software for businesses, teams and individuals. Users are able to remotely access their Windows, Mac, and Linux computers from a Windows, Mac, iOS, Android, or Chromebook device.
Splashtop SOS
Remote support software for IT support and help desks. Users are able to provide on-demand attended support to their clients' computers and mobile devices. To manage and support unattended computers, they must upgrade to the SOS+10 or SOS Unlimited plans.
Splashtop Remote Support
Remote support and endpoint management software designed for MSPs. MSPs are able to remotely support their internal and client computers and provide users with remote access.
Splashtop Enterprise
All-in-one remote access and remote support solution for organizations. Organizations are able to give employees remote access to computers and provide remote support for computers and mobile devices.
Splashtop Enterprise for Remote Labs
All-in-one remote access and remote support solution for educational institutions. Education IT admins are able to deploy, manage, and schedule remote access for students' and faculty members' on-campus lab computers through a centralized console. Flexible grouping and access permissions allow IT admins to give students and instructors access only to the computers they need.
Splashtop On-Prem
All-in-one self-hosted remote access and remote support solution for organizations. Organizations are able to give employees remote access to computers and provide remote support for computers and mobile devices.
Functionality
Splashtop remote desktop applications map the screen of the mobile device to the screen of the remote computer, so that users can interact with the remote computer. For desktop computers, the keyboard and mouse of the client computer will control the same functions on the server computer.
Where a mobile device controls a desktop computer, Splashtop uses touch-to-click controls and zooms using the pinch gesture. Gestures are used to replace mouse and keyboard controls. For example, a two-finger drag gesture is used to scroll within windows, generally mapping to the mouse wheel controller. Splashtop uses a modified version of the mobile keyboard which includes special keys, such as Ctrl, Alt, or Delete.
Compatibility
The current versions of Splashtop Streamer are available for Microsoft Windows XP and later, as well as for Windows Server versions 2003 and later. Splashtop also has support for Mac OS X 10.7 (Lion) and later versions.
The Splashtop Personal client application is available for the iPad, iPhone and iPod touch from the Apple App Store, as well as Android (including Kindle Fire), Windows and Mac, and Chromebook.
Company history
Splashtop Inc. is a privately held software company founded in 2006 and headquartered in Silicon Valley with offices in Amsterdam, Tokyo, Singapore, Hangzhou and Taipei.
The company was founded in 2006 under the name DeviceVM Inc. Its first product, named Splashtop OS, was an ‘instant-on’ Linux-based computing platform. The company partners with OEMs and manufacturers to integrate this technology into personal computers. The company changed its name to Splashtop in 2010.
Splashtop Inc. launched its Splashtop Remote product in August 2010.
The original Splashtop Remote product was split into multiple products with the release of Splashtop Business in 2013. The original consumer-focused solution was renamed Splashtop Personal. Splashtop Remote Support was announced in 2015 as Splashtop Business for Remote Support and later renamed Splashtop Remote Support. Splashtop On-Demand Support was introduced in 2015.
See also
Comparison of remote desktop software
References
External links
Remote administration software
Remote desktop
Windows remote administration software
MacOS remote administration software
|
31344199
|
https://en.wikipedia.org/wiki/UT-VPN
|
UT-VPN
|
University of Tsukuba Virtual Private Network, UT-VPN is a free and open source software application that implements virtual private network (VPN) techniques for creating secure point-to-point or site-to-site connections in routed or bridged configurations and remote access facilities. It uses SSL/TLS security for encryption and is capable of traversing network address translators (NATs) and firewalls. It was written by Daiyuu Nobori and SoftEther Corporation, and is published under the GNU General Public License (GPL) by University of Tsukuba.
UT-VPN has compatible as PacketiX VPN product of SoftEther Corporation. UT-VPN developed based on PacketiX VPN, but some functions was deleted. For example, the RADIUS client is supported by PacketiX VPN Server, but it is not supported by UT-VPN Server.
Architecture
Encryption
UT-VPN uses the OpenSSL library to provide encryption to packets.
Authentication
UT-VPN offers username/password-based authentication.
Networking
UT-VPN is software to consist of UT-VPN Server and UT-VPN Client. UT-VPN functions as L2-VPN (over SSL/TLS).
UT-VPN Client
'Virtual NIC' (virtual network interface card) is installed in OS how UT-VPN Client was installed in. Virtual NIC is recognized as physical NIC by OS. UT-VPN does encapsulation to TCP (or SSL/TLS) packets from L2 frames by Virtual NIC.
UT-VPN Client connects with UT-VPN Server. If authorization with UT-VPN Server succeeded, UT-VPN Client establishes connection with Virtual HUB.
UT-VPN Server
UT-VPN Server have some 'Virtual HUB', and they function as virtual L2 switch. Virtual HUB does handle frames which received from UT-VPN Client. If necessary, UT-VPN Server forwards encapsulated L2 frames to UT-VPN Client.
Virtual HUB on UT-VPN Server has function cascading connection for Virtual HUB on other UT-VPN Server. Site-to-site connection can come true with cascading connection.
L2 Bridge
UT-VPN Server has bridging function between arbitrary NIC which OS has and virtual HUB.
L3 Switch
UT-VPN Server has Virtual L3 switch function. Virtual L3 switch does L3-switching between virtual HUB on the UT-VPN Server.
Operational Environment
UT-VPN Server
Windows
Windows 98 / Millennium Edition
Windows NT 4.0
Windows 2000
Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Hyper-V Server
Windows 7
Windows Server 2008 R2
* Supported for x86/x64
UNIX
Linux (2.4 or later)
FreeBSD (6.0 or later)
Solaris (8.0 or later)
Mac OS X (Tiger or later)
* If it is the environment where compiling it is possible of the source code, UT-VPN Server works.
UT-VPN Client
Windows
Windows 98
Windows ME
Windows 2000
Windows XP
Windows Server 2003
Windows Vista
Windows Server 2008
Hyper-V Server
Windows 7
Windows Server 2008 R2
*Supported for x86/x64
UNIX
Linux (2.4 or later)
* The Virtual NIC does not work in other UNIX operating systems.
Community
The primary method for community support is through the SoftEther mailing lists.
See also
University of Tsukuba
SoftEther Corporation
OpenVPN, The well-known open source VPN software.
References
External links
Official links
UT-VPN OpenSource Project (Japanese)
UT-VPN Download (Japanese, require email address)
Computer network security
Tunneling protocols
Free security software
Unix network-related software
|
22348455
|
https://en.wikipedia.org/wiki/Memory%20virtualization
|
Memory virtualization
|
In computer science, memory virtualization decouples volatile random access memory (RAM) resources from individual systems in the data centre, and then aggregates those resources into a virtualized memory pool available to any computer in the cluster. The memory pool is accessed by the operating system or applications running on top of the operating system. The distributed memory pool can then be utilized as a high-speed cache, a messaging layer, or a large, shared memory resource for a CPU or a GPU application.
Description
Memory virtualization allows networked, and therefore distributed, servers to share a pool of memory to overcome physical memory limitations, a common bottleneck in software performance. With this capability integrated into the network, applications can take advantage of a very large amount of memory to improve overall performance, system utilization, increase memory usage efficiency, and enable new use cases. Software on the memory pool nodes (servers) allows nodes to connect to the memory pool to contribute memory, and store and retrieve data. Management software and the technologies of memory overcommitment manage shared memory, data insertion, eviction and provisioning policies, data assignment to contributing nodes, and handles requests from client nodes. The memory pool may be accessed at the application level or operating system level. At the application level, the pool is accessed through an API or as a networked file system to create a high-speed shared memory cache. At the operating system level, a page cache can utilize the pool as a very large memory resource that is much faster than local or networked storage.
Memory virtualization implementations are distinguished from shared memory systems. Shared memory systems do not permit abstraction of memory resources, thus requiring implementation with a single operating system instance (i.e. not within a clustered application environment).
Memory virtualization is also different from storage based on flash memory such as solid-state drives (SSDs) - SSDs and other similar technologies replace hard-drives (networked or otherwise), while memory virtualization replaces or complements traditional RAM.
Benefits
Products
RNA networks Memory Virtualization Platform - A low latency memory pool, implemented as a shared cache and a low latency messaging solution.
ScaleMP - A platform to combine resources from multiple computers for the purpose of creating a single computing instance.
Wombat Data Fabric – A memory based messaging fabric for delivery of market data in financial services.
Oracle Coherence is a Java-based in-memory data-grid product by Oracle
AppFabric Caching Service is a distributed cache platform for in-memory caches spread across multiple systems, developed by Microsoft.
IBM Websphere extremeScale is a Java-based distributed cache much like Oracle Coherence
GigaSpaces XAP is a Java based in-memory computing software platform like Oracle Coherence and VMware Gemfire
Implementations
Application level integration
In this case, applications running on connected computers connect to the memory pool directly through an API or the file system.
Operating System Level Integration
In this case, the operating system connects to the memory pool, and makes pooled memory available to applications.
Background
Memory virtualization technology follows from memory management architectures and virtual memory techniques. In both fields, the path of innovation has moved from tightly coupled relationships between logical and physical resources to more flexible, abstracted relationships where physical resources are allocated as needed.
Virtual memory systems abstract between physical RAM and virtual addresses, assigning virtual memory addresses both to physical RAM and to disk-based storage, expanding addressable memory, but at the cost of speed. NUMA and SMP architectures optimize memory allocation within multi-processor systems. While these technologies dynamically manage memory within individual computers, memory virtualization manages the aggregated memory of multiple networked computers as a single memory pool.
In tandem with memory management innovations, a number of virtualization techniques have arisen to make the best use of available hardware resources. Application virtualization was demonstrated in mainframe systems first. The next wave was storage virtualization, as servers connected to storage systems such as NAS or SAN in addition to, or instead of, on-board hard disk drives. Server virtualization, or Full virtualization, partitions a single physical server into multiple virtual machines, consolidating multiple instances of operating systems onto the same machine for the purpose of efficiency and flexibility. In both storage and server virtualization, the applications are unaware that the resources they are using are virtual rather than physical, so efficiency and flexibility are achieved without application changes. In the same way, memory virtualization allocates the memory of an entire networked cluster of servers among the computers in that cluster.
See also
Virtual memory - Traditional memory virtualization on a single computer, typically using the translation lookaside buffer (TLB) to translate between virtual and physical memory addresses
In-memory database - Provides faster and more predictable performance than disk-based databases
I/O virtualization - Creates virtual network and storage endpoints which allow network and storage data to travel over the same fabrics (XSigo I/O Director)
Storage virtualization - Abstracts logical storage from physical storage (NAS, SAN, File Systems (NFS, cluster FS), Volume Management, RAID)
RAM disk - Virtual storage device within a single computer, limited to capacity of local RAM.
InfiniBand
10 Gigabit Ethernet
Distributed shared memory
Remote direct memory access (RDMA)
Locality of reference
Single-system image
Distributed cache
References
Oleg Goldshmidt, Virtualization: Advanced Operating Systems
Hardware virtualization
de:Speichervirtualisierung
|
63941338
|
https://en.wikipedia.org/wiki/Cecilia%20Berdichevsky
|
Cecilia Berdichevsky
|
Cecilia Berdichevsky or Berdichevski (née Tuwjasz) (1925 – 2010) was a pioneering Argentinian computer scientist and began her work in 1961 using the first Ferranti Mercury computer in that country.
Biography
She was born Cecilia Tuwjasz on 30 March 1925 in Vilnius, which is now the capital city of Lithuania, but at that time was part of Poland.
Because of growing hostilities toward the Jewish community, her family emigrated to Argentina when Cecilia was five years old, and she spent her childhood years in Avellaneda, south of the Buenos Aires suburbs. Her father died within a few years of arriving in their new home and her mother remarried.
Cecilia married Mario Berdichevsky, a physician from Avellaneda, in 1951.
Despite having a good job as a practicing accountant for ten years, she was not happy there having experienced many frustrations. A friend, computer scientist Rebeca Guber, convinced her to go back to school, which changed her life.
Clementina
At the age of 31, Berdichevsky began her studies of mathematics at the University of Buenos Aires with Manuel Sadosky. There she had her first experience programming the new Ferranti Mercury computer, which became known by the nickname "Clementina" after someone programmed it to play the American song, "My darling Clementine." In 1961, when it arrived in Buenos Aires from England, Clementina was the most powerful computer in the country, cost $300,000 and measured in length. It was the first large computer used for scientific purposes in the country (in that same year, an IBM 1401 was installed in Buenos Aires for business uses).
The newly graduated Berdichevsky studied computing from the visiting English software engineer Cicely Popplewell (famous for having worked with Alan Turing in Manchester) and with the Spanish mathematician Ernesto García Camarero. Popplewell herself motivated Berdichevsky to write and run the first program for the new computer, which required multiple arithmetic calculations. A photoelectric device read a punched paper ribbon that was used to submit the data and Clementina produced the desired result in only seconds.
Based on Berdichevsky's progress in Argentina, in 1962 she was one of two people awarded scholarships to continue studies at the University of London's Computer Unit for five months, followed by the same length of time at a French institution. She returned home the following year as an expert on the workings of Clementina. According to Berdichevsky, "Work with Mercury was defined by its resources and its characteristics, structure and operational capabilities, as well as by the languages, routines, stored libraries and facilities that it offered... Mercury could not perform more than one operation at the same time, and they were the three basic arithmetical operations: addition, subtraction, and multiplication." The computer's resources included: machine language, an assembler named Pig2; a high-level programming language (a compiler) called Autocode. Later another compiler called Comic replaced Autocode. In those days, compilers were unique and were written only for each computer; they were not developed for use on multiple models of computers until years later.
In addition, Berdichevsky worked as Head of Practical Works of Numerical Calculus I, where the tenured professor was her mentor, Manuel Sadosky who was then vice-dean of the Faculty of Exact Sciences of the University of Buenos Aires from 1957 to 1966.
Coup d'état
Berdichevsky worked with Sadosky's institute until an Argentinian coup d'état that installed a military dictatorship, which imposed government control over the workings of the previously autonomous state universities. This intrusion led to student/professor sit-ins that resulted in the violent Night of the Long Batons on 29 July 1966 when military troops physically beat and evicted the academic occupiers from the University of Buenos Aires and other institutions of higher learning. Many academics, including Sadosky, were forced into exile.
Berdichevsky herself began working as an accountant. Between 1966 and 1970 she was also one of the directors of Scientific Technical Advisors (ACT), the company formed by her former academic associates, Manuel Sadosky, Rebeca Guber and Juan Chamero.
Later years
In 1984, Berdichevsky became Deputy General Manager of the Argentine savings bank Caja de Ahorro in charge of its computer center. She was also named the representative at the International Federation for Information Processing.
After her retirement, she continued to work as a computer consultant and participated in important international projects and organizations such as United Nations Development Program.
Cecilia Berdichevsky died in Avellaneda, Argentina, 28 February 2010.
Published work
Berdichevsky C. (2006) The Beginning of Computer Science in Argentina — Clementina – (1961–1966). In: Impagliazzo J. (eds) History of Computing and Education 2 (HCE2). IFIP Advances in Information and Communication Technology, vol 215. Springer, New York, NY (complete paper in English)
References
1925 births
2010 deaths
University of Buenos Aires alumni
Argentine Jews
Argentine mathematicians
Argentine computer scientists
People from Vilnius
People from Buenos Aires
Computer scientists
Women computer scientists
Argentine women computer scientists
|
2593416
|
https://en.wikipedia.org/wiki/Institute%20for%20Advanced%20Studies%20in%20Basic%20Sciences
|
Institute for Advanced Studies in Basic Sciences
|
Institute for Advanced Studies in Basic Sciences (IASBS) (Persian: دانشگاه تحصیلات تکمیلی علوم پایه زنجان, Daneshgah-e Tehesilât-e Tekimili-ye Olum-e Paih-e Zanjaan) also known as Zanjan Graduate University of Basic Sciences is a public advanced research center and university in Zanjan, Iran founded in 1991 by Prof. Yousef Sobouti. The goal of establishing IASBS was to provide a leading research-based institute in advanced science topics for both researchers and students in Iran.
The institute offers various M.Sc. and PhD degrees in Computer Science, Mathematics, Physics, Geophysics, Biophysics, Biochemistry and Chemistry. Although IASBS was established as a graduate-level degree-granting institution, it also offers a B.Sc. program in Computer Engineering. Acceptance to the institute is competitive and entrance to its programs requires performing well in the Iranian University Entrance Exam, known as 'Konkour'.
The University Campus
Zanjan city in Iranian Azerbaijan region, 298 km to the north-west of Tehran, was chosen for the Institute. The location was far enough from Tehran to not be affected by the distractions of the city but close enough to pursue the many ensuing official and budgetary problems in Tehran. The main campus of the university is located close to Zanjan University of Medical Sciences in Gavazang area, Zanjan, Iran. IASBS campus is widely credited to be a Green campus with plants and greeneries being part of the campus design, even in classes and buildings. Moreover, IASBS is one of the few universities in Iran benefiting from solar energy solutions. Buildings in main campus are:
Department of Physics
Department of Chemistry
Department of Mathematics
Department of Computer Science and Information Technology
Department of Earth Sciences
Department of Biological Sciences
Torkaman Library
House of Science
Science and Technology Park (Zanjan Techno-Center)
University Dining Hall
Gym (I and II)
Mosque
Dormitories
Departments and Research Centers
IASBS has 6 departments and 2 research centers.
Department of Physics
The Physics Department started its activity in 1992 as the first department of IASBS. The M.Sc. program was launched in 1992 with 3 faculty members and 7 students. In 1995, the first PhD students were admitted to work on theoretical condensed matter physics, astrophysics and mathematical physics. After a while, graduate programs in experimental optics were established. In 2000, a 7-year program leading to a PhD degree was established. In this program students directly proceed to their PhD thesis after completing their undergraduate and graduate courses, thereby skipping the M.Sc. dissertation. At present, IASBS is the only institute in the country offering such a program. Research in Department of Physics is focused in Astrophysics and Cosmology, Hard condensed matter, Soft condensed matter, Statistical mechanics, Optics and Photonics.
Department of Mathematics
Established in 1994, The Department of Mathematics offers M.Sc. and PhD programs. The active research groups of the Department are in the fields of Algebra, Analysis, Geometry, Graph theory, Computer Science and Financial Mathematics.
Department of Chemistry
The Department of Chemistry at the IASBS started its formal activities in fall 1999 with five Master’s students and five faculty members, seven years after the opening of the Institute. The courses initially focused in two areas, analytical chemistry, and organic chemistry. In the winter of 2005, first group of PhD students started their studies. Currently, there are more than 200 PhD and Master’s Students and 20 faculty members in the department. Research is focused in Organic Chemistry, Analytical Chemistry, Physical Chemistry, Inorganic Chemistry, Nano Chemistry, and Polymer Chemistry.
Department of Computer Science and Information Technology
Department of Computer Science and Information Technology was established in 2003 with the B.Sc. program in Information Technology and, immediately after, the M.Sc. program in Computer Science. Now department runs an undergraduate program in computer engineering and M.Sc. and PhD programs in Computer Science. Research in this department is mainly focused on Algorithms and Theory of Computing, Artificial Intelligence, System Theory and Data Mining.
Department of Earth Sciences
Department of Earth Sciences was established in 1999 inside the Department of Physics. Now as an independent department, It offers M.Sc. and PhD programs in geophysics and M.Sc. programs in Structural Geology and Tectonics. Department of Earth Sciences is currently active in the fields of Geophysics, Tectonics, Petrology and Hydrology and Hydrogeology.
Department of Biological Sciences
Department of Biological Sciences was established in 2008 as the newest department of the Institute for Advanced Studies in Basic Sciences. At present, the department offers M.Sc. programs in biochemistry and biophysics and direct PhD programs in biochemistry and biophysics. The research laboratories in department of biological sciences are Biochemistry, Biophysics, Bacterial Culture, Cell Culture and Bio-informatics.
Advanced Research Centers
Center for Research in Climate Change and Global Warming
Research Center for Basic Sciences and Modern Technologies (RBST)
Programs
IASBS was established as a graduate-level degree-granting institution. Now it offers M.Sc. and PhD degrees in Computer Science, Mathematics, Physics, Geophysics, Biophysics, Biochemistry and Chemistry. Since September 2000, however, it has started a program in physics for a group of distinguished high school graduates. The program, a first attempt at the national level, will train these selected groups of students over a period of seven years, granting them a PhD degree in physics. In this program students directly proceed to their PhD thesis after completing their undergraduate and graduate courses, thereby skipping the M.Sc. dissertation. IASBS also offers a bachelor of science degree in computer engineering which is the only undergraduate program in the institute. The institute also used to run a joint undergraduate program in Information Technology with Heriot-Watt University of the United Kingdom.
Awards and Rankings
Ranked 2nd in Iran by Iran Science Elites Federation (2016)
Ranked 8th in Iran by Islamic Science Citation Center in 2015-2016 and 2016-2017
Announced as the centre of excellence in physics by Iran Ministry of Science, Research and Technology
Awarded by Islamic Development Bank in science and technology
SCImago Institutions Rankings:
2017 World Ranking: 612
2016 World Ranking: 620
2015 World Ranking: 617
The International Advisory Council
The International Advisory Council of the Institute is composed of a host of scholars and scientists. Members of the Council assist the Institute in delineating its general themes of research, establishing new disciplines, attracting prominent researchers and evaluating its scientific achievements.
Members
Mohammad Abdus Salam, The Abdus Salam International Center for Theoretical Physics (ICTP), Italy (deceased)
Asim Orhan Barut, University of Colorado, USA
Nasser Peyghambarian, University of Arizona, USA
Subrahmanyan Chandrasekhar, University of Chicago, USA (deceased)
Govind Swarup, Inter-University Center for Astronomy and Astrophysics (IUCAA), India
Seifallah Randjbar-Daemi, The Abdus Salam ICTP, Italy
Mehran Kardar, MIT, USA
John Clark, Washington University, USA
Sang-Soo Lee, Korea Advanced Institute of Science and Technology, South Korea
Bahram Mashhoon, University of Missouri, USA
Mudumbai S. Narasimhan, The Abdus Salam ICTP, Italy
Cumrun Vafa, Harvard University, USA
E. Van den Heuvel, University of Amsterdam, the Netherlands
Notable alumni
List of notable alumni from the institute include:
Yousef Sobouti (Physics): First place of the Khwarizmi International Award in basic sciences (1999). Medal Lecture, in Physical Sciences, The Third World Academy of Sciences, TWAS (2000). Selected member of Iranian Science and Culture Hall of Fame, Unforgettable Faces (2001)
Babak Karimi (Chemistry): First place of the Khwarizmi Young Award in basic sciences (1999). Distinguished researcher elected by Iranian ministry of sciences, research and technology (2003). Alexander von Humboldt Fellowship (2004)
Ramin Golestanian (Physics): He was awarded the Holweck Prize (2014). First place of the Khwarizmi Young Award in basic sciences (2000). Distinguished researcher elected by Iranian ministry of sciences, research and technology (2001). Frederic Joliot Visiting Chair at Ecole Superieure de Physique et de Chimie Industrielles (ESPCI) in Paris (2000)
Arashmid Nahal (Physics): ICO/ICTP Gallieno Denardo Award (2001)
Mehdi Khakian (Physics): First place of the Khwarizmi International Award in basic sciences (2006)
Mohammad Rafiee (Chemistry): First place the Khwarizmi Young Award in basic sciences (2008)
Alireza Qaiumzadeh (Physics): Second place of the Khwarizmi Young Award in basic sciences (2009)
Saifollah Rasouli (Physics): ICO/ICTP Gallieno Denardo Award (2009)
Mohammad Mahdi Najafpour (Chemistry): First place of the Khwarizmi Young Award in basic sciences (2010)
Ali Ghorbanzadeh Moghaddam (Physics): Second place of the Khwarizmi Young Award in basic sciences (2010)
Mohammad Taghi Tavassoly (Physics): The ICO Galileo Galilei Award (2010) for lifelong effort in optics education in Iran dedicated by the International Commission for Optics (ICO)
See also
University of Zanjan
Zanjan University of Medical Sciences
Islamic Azad University of Zanjan
Institute for Studies in Theoretical Physics and Mathematics (IPM)
Higher Education in Iran
List of universities in Iran
References
Research institutes in Iran
Universities in Iran
Educational institutions established in 1991
Education in Zanjan Province
Buildings and structures in Zanjan Province
1991 establishments in Iran
|
3224513
|
https://en.wikipedia.org/wiki/MYOB%20%28company%29
|
MYOB (company)
|
MYOB is an Australian multinational corporation that provides tax, accounting and other business services software to small and medium businesses.
History
MYOB was founded in the early 1980s by a team of developers at Teleware, who developed accounting software. Teleware was purchased by Best Software (now part of Sage) in 1993. Data-Tech Software was the Australia republisher of the MYOB products and, in 1997 entered into an agreement with Best Software to buy the company (renamed MYOB Inc.) and bought the intellectual property rights to the software. In 1999, Data-Tech changed its name to MYOB Limited and listed on the Australian Stock Exchange (ASX) on 9 July. In subsequent corporate development, MYOB Limited merged with Solution 6 Holdings in 2004. Though the company was founded in the United States, it ceased operations outside of Australia and New Zealand in 2008.
Co-founder Brad Shofer left the company in 2003.
On 6 December 2008, Acclivity announced it acquired MYOB US Inc. and its Macintosh (and PC) development team from MYOB Limited of Australia. Acclivity now drive global development of MYOB's Mac OS business management products – AccountEdge Basic, AccountEdge Pro and AccountEdge Pro Network Edition.
In January 2009, a private equity consortium led by Archer Capital completed a takeover bid for MYOB, returning MYOB to private ownership.
On 21 August 2011, Archer Capital sold MYOB to Bain Capital for an undisclosed amount. The acquisition gave Bain Capital a majority stake in MYOB alongside management continued to be shareholders in the company.
MYOB Group Limited was readmitted to the official list of the Australian Securities Exchange on 4 May 2015.
In November 2017, MYOB proposed to buy Reckon's accounting group for $180 million. However, failure to obtain regulatory permission caused the deal to fall apart in May 2018.
In April 2018, MYOB sold its rental payment system RentPay to Rent.com.au for $425,000. In May 2018, MYOB partnered with Network 10's Shark Tank.
MYOB Group Limited was delisted from the ASX on 8 May 2019, after sold to private equity firm Kohlberg Kravis Roberts.
Products
MYOB has a suite of subscription-based products and a browser-based accounting product that was released in August 2010. On 24 October 2012, MYOB released AccountRight Live an update to its flagship product – a Microsoft Windows only software suite which has online storage of data.
Mergers and acquisitions
Greentree on 1 August 2016
Ace Payroll on 1 June 2015
IMS Payroll
PayGlobal
BankLink 4 June 2013
Acquired by Bain Capital in Sept 2011
Smartyhost on 20 August 2008 – divested 5 August 2013
ilisys on 28 February 2008 – divested 5 August 2013
Exonet on 5 January 2007 - Tim Molloy, Bruce Carr and Sam Lewis-Roberts
Comacc Limited on 1 August 2006
Macquarie Outsource Pty Ltd and Macquarie Outsource Sdn Bhd on 30 March 2006
Conto Ltd and JumpStart Computer Accounting and Trainers Ltd on 31 January 2006
Solution 6 Holdings on 29 March 2004
NZA Gold Limited on 5 March 2003
Rorquals Business Solutions Limited on 23 November 2000
SeaSoft Computer Services Sdn Bhd on 9 October 2000
Professional Tools (NZ) Ltd on 30 November 1999
Blue Tongue Technology Pty Ltd on 11 October 1999
CA Systems on 27 September 1999
Tall Emu CRM 2022
Acquisitions by Solution 6 before merger with MYOB
Xlon Pty Ltd and parent company Ceedata Holdings on 8 December 2000
VIZTOPIA Software Limited and parent company MICL Holdings Limited on 19 September 2000
Acquisitions by Data-Tech Software Pty Ltd before changing name to MYOB
Teletax Systems Pty Ltd on 8 October 1997
Bestware in 1996
See also
Comparison of accounting software
References
External links
Official website
Accounting software
Financial software companies
Point of sale companies
Online financial services companies of Australia
Australian brands
Companies formerly listed on the Australian Securities Exchange
Bain Capital
Kohlberg Kravis Roberts
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.